Sciweavers

2004 search results - page 254 / 401
» Comparison of Model Checking Tools for Information Systems
Sort
View
194
Voted
CIKM
2009
Springer
15 years 2 months ago
A tag recommendation system for folksonomy
Social bookmarking tools become more and more popular nowadays and tagging is used to organize information and allow users to recall or search the resources. Users need to type th...
Ning Zhang, Yuan Zhang, Jie Tang
TMI
2011
182views more  TMI 2011»
14 years 11 months ago
Active Volume Models for Medical Image Segmentation
—In this paper, we propose a novel predictive model, active volume model (AVM), for object boundary extraction. It is a dynamic “object” model whose manifestation includes a ...
Tian Shen, Hongsheng Li, Xiaolei Huang
130
Voted
CBMS
2005
IEEE
15 years 10 months ago
An Ontology-Driven Clustering Method for Supporting Gene Expression Analysis
The Gene Ontology (GO) is an important knowledge resource for biologists and bioinformaticians. This paper explores the integration of similarity information derived from GO into ...
Haiying Wang, Francisco Azuaje, Olivier Bodenreide...
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 10 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
SACMAT
2003
ACM
15 years 10 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck