Sciweavers

1893 search results - page 277 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
SECURWARE
2008
IEEE
14 years 2 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 2 months ago
Challenges in Health Informatics
Early grand challenge papers in health informatics identified numerous challenges, many of which either remain as open questions or have been resolved within fairly narrow domains...
Michael A. Shepherd
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
14 years 2 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
GEOS
2007
Springer
14 years 2 months ago
Applying Spatial Reasoning to Topographical Data with a Grounded Geographical Ontology
Abstract. Grounding an ontology upon geographical data has been proposed as a method of handling the vagueness in the domain more effectively. In order to do this, we require meth...
David Mallenby, Brandon Bennett
ICCS
2007
Springer
14 years 2 months ago
Construction of Ontology-Based Software Repositories by Text Mining
Software document repositories store artifacts produced in the course of developing software products. But most repositories are simply archives of documents. It is not unusual to ...
Yan Wu, Harvey P. Siy, Mansour Zand, Victor L. Win...