Sciweavers

1368 search results - page 268 / 274
» Knowledge Management in Network Contexts
Sort
View
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
CIMCA
2005
IEEE
14 years 1 months ago
Topic-Based Audience Metrics for Internet Marketing by Combining Ontologies and Output Page Mining
In Internet marketing, Web audience analysis is essential to understanding the visitors’ needs. However, the existing analysis tools fail to deliver summarized and conceptual me...
Jean-Pierre Norguet, Esteban Zimányi
SEMWEB
2004
Springer
14 years 1 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin
ACMICEC
2003
ACM
118views ECommerce» more  ACMICEC 2003»
14 years 1 months ago
Visualization of EDI messages: facing the problems in the use of XML
Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has bec...
Reija Korhonen, Airi Salminen
ICWE
2003
Springer
14 years 1 months ago
Semi-automatic Assessment Process in a Ubiquitous Environment for Language Learning
This work presents a research on the methods and mechanisms necessary to bring the Information and Communication Technologies in the traditional classroom. This will be achieved by...
Maximiliano Paredes, Manuel Ortega, Pedro P. S&aac...