Sciweavers

1092 search results - page 76 / 219
» Do summaries help
Sort
View
HOTOS
1999
IEEE
15 years 8 months ago
The Box: A Replacement for Files
The file is a well-understood and very simple abstraction, which has been successfully used in both centralized and distributed systems. However, files are not expressive enough t...
Francisco J. Ballesteros, Sergio Arévalo
SIGADA
1998
Springer
15 years 8 months ago
Looking into Safety with the Safety and Security Rapporteur Group
The requirements of High Integrity safety-critical, secure and mission-critical Software force developers to use specialised development techniques. Often the choice of computer l...
Stephen Michell, Mark Saaltink, Brian A. Wichmann
ER
2007
Springer
138views Database» more  ER 2007»
15 years 6 months ago
Model-Driven Development Based Transformation of Stereotyped Class Diagrams to XML Schemas in a Healthcare Context
The health sector uses clinical guidelines as instruments for helping decision making. We are interested in the development of a ubiquitous decision support system (UDSS) for clini...
Eladio Domínguez, Jorge Lloret, Beatriz P&e...
DBSEC
2010
126views Database» more  DBSEC 2010»
15 years 6 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
LREC
2008
125views Education» more  LREC 2008»
15 years 6 months ago
Adaptation of Relation Extraction Rules to New Domains
This paper presents various strategies for improving the extraction performance of less prominent relations with the help of the rules learned for similar relations, for which lar...
Feiyu Xu, Hans Uszkoreit, Hong Li, Niko Felger