Sciweavers

858 search results - page 103 / 172
» BMM: A Business Modeling Method For Information Systems Deve...
Sort
View
CASES
2008
ACM
13 years 9 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
DIMVA
2006
13 years 9 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
AIMS
2007
Springer
14 years 2 months ago
Harnessing Models for Policy Conflict Analysis
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...
Steven Davy, Brendan Jennings
DSS
2008
133views more  DSS 2008»
13 years 8 months ago
A semantic-expansion approach to personalized knowledge recommendation
The rapid propagation of the Internet and information technologies has changed the nature of many industries. Fast response and personalized recommendations have become natural tr...
Ting-Peng Liang, Yung-Fang Yang, Deng-Neng Chen, Y...
KDD
2009
ACM
206views Data Mining» more  KDD 2009»
14 years 8 months ago
Ranking-based clustering of heterogeneous information networks with star network schema
A heterogeneous information network is an information network composed of multiple types of objects. Clustering on such a network may lead to better understanding of both hidden s...
Yizhou Sun, Yintao Yu, Jiawei Han