Sciweavers

498 search results - page 24 / 100
» From Perceptual Categories to Concepts: What Develops
Sort
View
CCS
2006
ACM
13 years 11 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
ISESE
2005
IEEE
14 years 1 months ago
Risk analysis terminology for IT-systems: does it match intuition?
Many risk specific concepts like “threat”, “consequence” and “risk” belong to the daily language. In a risk analysis one cannot be certain that the participants’ int...
Ida Hogganvik, Ketil Stølen
KDD
2005
ACM
147views Data Mining» more  KDD 2005»
14 years 1 months ago
Combining proactive and reactive predictions for data streams
Mining data streams is important in both science and commerce. Two major challenges are (1) the data may grow without limit so that it is difficult to retain a long history; and (...
Ying Yang, Xindong Wu, Xingquan Zhu
CE
2004
88views more  CE 2004»
13 years 7 months ago
Beyond formal learning: Informal community eLearning
The goal of the study described in this paper was to gain an improved understanding of the social context of UK online centres and issues around the creation and exchange of knowl...
John Cook, Matt Smith
SIGMOD
2008
ACM
101views Database» more  SIGMOD 2008»
14 years 7 months ago
Pay-as-you-go user feedback for dataspace systems
A primary challenge to large-scale data integration is creating semantic equivalences between elements from different data sources that correspond to the same real-world entity or...
Shawn R. Jeffery, Michael J. Franklin, Alon Y. Hal...