Sciweavers

1235 search results - page 178 / 247
» Formalizing information security knowledge
Sort
View
MKWI
2008
142views Business» more  MKWI 2008»
13 years 9 months ago
A Decentralized and Ontology-Based Approach to Infrastructure Monitoring
: We introduce infrastructure monitoring as an application domain that demands decentralized system designs. This is motivated by the large scale of these systems, the heterogeneit...
Florian Fuchs, Michael Berger
DMIN
2006
83views Data Mining» more  DMIN 2006»
13 years 9 months ago
On Novelty Evaluation of Potentially Useful Patterns
- As is generally accepted, the most important feature that a Knowledge Discovery in Database (KDD) system must possess is, to be able to discover patterns that are "novel&quo...
Ying Xie, Manmathasivaram Nagarajan, Vijay V. Ragh...
IFIP
2010
Springer
13 years 2 months ago
Modeling Identity-Related Properties and Their Privacy Strength
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
Meilof Veeningen, Benne de Weger, Nicola Zannone
SEMWEB
2010
Springer
13 years 2 months ago
The Semantic Web needs more cognition
One of the key deficiencies of the Semantic Web is its lack of cognitive plausibility. We argue that by accounting for people's reasoning mechanisms and cognitive representati...
Martin Raubal, Benjamin Adams
TLDI
2010
ACM
198views Formal Methods» more  TLDI 2010»
13 years 8 months ago
Verifying event-driven programs using ramified frame properties
Interactive programs, such as GUIs or spreadsheets, often maintain dependency information over dynamically-created networks of objects. That is, each imperative object tracks not ...
Neel R. Krishnaswami, Lars Birkedal, Jonathan Aldr...