Sciweavers

1352 search results - page 81 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CAISE
2000
Springer
14 years 1 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
TIP
2010
170views more  TIP 2010»
13 years 3 months ago
Tracking and Activity Recognition Through Consensus in Distributed Camera Networks
Camera networks are being deployed for various applications like security and surveillance, disaster response and environmental modeling. However, there is little automated process...
Bi Song, Ahmed T. Kamal, Cristian Soto, Chong Ding...
JODS
2006
148views Data Mining» more  JODS 2006»
13 years 9 months ago
Discovering the Semantics of Relational Tables Through Mappings
Abstract. Many problems in Information and Data Management require a semantic account of a database schema. At its best, such an account consists of formulas expressing the relatio...
Yuan An, Alexander Borgida, John Mylopoulos
IADIS
2003
13 years 10 months ago
An Agent-Based Architecture for Demand-Responsive Passenger Service
Demand responsive transport services are systems that assign users’ specific transport requests to different vehicles enabled to fulfill the required service. In order to contai...
Claudio Cubillos, Franco Guidi-Polanco
SAC
2005
ACM
14 years 2 months ago
A complex biological database querying method
Many biological information systems rely on relational database management systems (RDBMS) to manage high-throughput biological data. While keeping these data well archived, organ...
Jake Yue Chen, John V. Carlis, Ning Gao