Sciweavers

2766 search results - page 435 / 554
» Hybridizing a Logical Framework
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 3 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
TIME
2005
IEEE
14 years 3 months ago
A Local Method for Prioritized Fusion of Temporal Information
Information often comes from different sources and merging these sources usually leads to the apparition of inconsistencies. Fusion is the operation which consists in restoring th...
Mahat Khelfallah, Belaid Benhamou
ACMSE
2005
ACM
14 years 3 months ago
Metadata management and relational databases
A simple extension to the relational model that permits metadata (more generally metaknowledge) to be stored and manipulated as first class data is proposed. The accompanying que...
Shun Yan Cheung, James J. Lu, Catharine M. Wyss
CIKM
2005
Springer
14 years 3 months ago
Information retrieval and machine learning for probabilistic schema matching
Schema matching is the problem of finding correspondences (mapping rules, e.g. logical formulae) between heterogeneous schemas e.g. in the data exchange domain, or for distribute...
Henrik Nottelmann, Umberto Straccia
ESWS
2005
Springer
14 years 3 months ago
Semantic-Based Automated Composition of Distributed Learning Objects for Personalized E-Learning
Recent advances in e-learning techonologies and web services make realistic the idea that courseware for personalized e-learning can be built by dynamic composition of distributed ...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...