Sciweavers

25189 search results - page 149 / 5038
» Information Systems Frontiers
Sort
View
IADIS
2003
15 years 5 months ago
Adaptive Hypermedia Systems Featuring Information Customization Using Constraint Satisfaction Methods
We present an Information Customization framework, which offers a unique hybrid of Adaptive Hypermedia and Constraint Satisfaction methods. IC is being modelled as a constraint sa...
Chong Yan Han, Syed Sibte Raza Abidi, Yu-N Cheah
IEEEIA
2009
15 years 2 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
GCB
2005
Springer
138views Biometrics» more  GCB 2005»
15 years 10 months ago
Inferring Regulatory Systems with Noisy Pathway Information
: With increasing number of pathways available in public databases, the process of inferring gene regulatory networks becomes more and more feasible. The major problem of most of t...
Christian Spieth, Felix Streichert, Nora Speer, An...
IV
2002
IEEE
114views Visualization» more  IV 2002»
15 years 9 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
ACSW
2004
15 years 5 months ago
A Case Study in Access Control Requirements for a Health Information System
We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involv...
Mark Evered, Serge Bögeholz