Sciweavers

578 search results - page 110 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
ICDE
2007
IEEE
170views Database» more  ICDE 2007»
14 years 1 months ago
A UML Profile for Core Components and their Transformation to XSD
In business-to-business e-commerce, traditional electronic data interchange (EDI) approaches such as UN/EDIFACT have been superseded by approaches like web services and ebXML. Nev...
Christian Huemer, Philipp Liegl
CCS
2009
ACM
14 years 10 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
HICSS
2009
IEEE
123views Biometrics» more  HICSS 2009»
14 years 4 months ago
Towards Conceptual Metamodeling of IT Governance Frameworks Approach - Use - Benefits
Up to now, there has been little academic support for the challenges of IT governance/IT management. As a reaction, various best practice frameworks - like COBIT or CMMI - were de...
Matthias Goeken, Stefanie Alter
QEST
2008
IEEE
14 years 4 months ago
Approximate Analysis of Probabilistic Processes: Logic, Simulation and Games
We tackle the problem of non robustness of simulation and bisimulation when dealing with probabilistic processes. It is important to ignore tiny deviations in probabilities becaus...
Josée Desharnais, François Laviolett...
ADC
2006
Springer
188views Database» more  ADC 2006»
14 years 3 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou