Sciweavers

4296 search results - page 695 / 860
» Knowledge Management and Collaboration
Sort
View
141
Voted
JCP
2008
116views more  JCP 2008»
15 years 4 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
PSYCHNOLOGY
2008
156views more  PSYCHNOLOGY 2008»
15 years 4 months ago
SIM: A dynamic multidimensional visualization method for social networks
Visualization plays an important role in social networks analysis to explore and investigate individual and groups behaviours. Therefore, different approaches have been proposed f...
Maria Chiara Caschera, Fernando Ferri, Patrizia Gr...
CAISE
2010
Springer
15 years 3 months ago
Search Computing Systems
Search computing is a novel discipline whose goal is to answer complex, multi-domain queries. Such queries typically require combining in their results domain knowledge extracted ...
Stefano Ceri, Marco Brambilla
151
Voted
IV
2010
IEEE
170views Visualization» more  IV 2010»
15 years 3 months ago
A Visualization Technique for Access Patterns and Link Structures of Web Sites
There have been two types of Web visualization techniques: visualization of Web sites themselves based on such as link structures or lexical contents, and visualization of browser...
Makiko Kawamoto, Takayuki Itoh
SACMAT
2010
ACM
15 years 2 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu