Sciweavers

1352 search results - page 81 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CAISE
2000
Springer
15 years 7 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
159
Voted
TIP
2010
170views more  TIP 2010»
14 years 10 months ago
Tracking and Activity Recognition Through Consensus in Distributed Camera Networks
Camera networks are being deployed for various applications like security and surveillance, disaster response and environmental modeling. However, there is little automated process...
Bi Song, Ahmed T. Kamal, Cristian Soto, Chong Ding...
130
Voted
JODS
2006
148views Data Mining» more  JODS 2006»
15 years 3 months ago
Discovering the Semantics of Relational Tables Through Mappings
Abstract. Many problems in Information and Data Management require a semantic account of a database schema. At its best, such an account consists of formulas expressing the relatio...
Yuan An, Alexander Borgida, John Mylopoulos
118
Voted
IADIS
2003
15 years 4 months ago
An Agent-Based Architecture for Demand-Responsive Passenger Service
Demand responsive transport services are systems that assign users’ specific transport requests to different vehicles enabled to fulfill the required service. In order to contai...
Claudio Cubillos, Franco Guidi-Polanco
140
Voted
SAC
2005
ACM
15 years 9 months ago
A complex biological database querying method
Many biological information systems rely on relational database management systems (RDBMS) to manage high-throughput biological data. While keeping these data well archived, organ...
Jake Yue Chen, John V. Carlis, Ning Gao