Sciweavers

3674 search results - page 176 / 735
» Information Dependencies
Sort
View
IASTEDSE
2004
13 years 11 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
WER
2004
Springer
14 years 3 months ago
Taxonomic Ontology Alignment - an Implementation
With the evolution of the Web evolving towards the Semantic Web, where the information should be presented in a meaningful way for both humans and machines, arises the need for sem...
Carolina Howard Felicíssimo, Karin Koogan B...
SIGSOFT
2008
ACM
14 years 11 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
CIKM
2010
Springer
13 years 8 months ago
TAER: time-aware entity retrieval-exploiting the past to find relevant entities in news articles
Retrieving entities instead of just documents has become an important task for search engines. In this paper we study entity retrieval for news applications, and in particular the...
Gianluca Demartini, Malik Muhammad Saad Missen, Ro...
PARCO
2003
13 years 11 months ago
SIMD design to solve partial differential equations
The relation between autonomous and communication phases determines the throughput of parallel structured information processing systems. Such a relation depends on the algorithm w...
R. W. Schulze