Sciweavers

116 search results - page 7 / 24
» Logical effort based technology mapping
Sort
View
ADC
2007
Springer
150views Database» more  ADC 2007»
14 years 4 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
GIS
2008
ACM
14 years 11 months ago
A location aware role and attribute based access control system
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
SEMWEB
2010
Springer
13 years 7 months ago
Enabling Ontology-Based Access to Streaming Data Sources
The availability of streaming data sources is progressively increasing thanks to the development of ubiquitous data capturing technologies such as sensor networks. The heterogeneit...
Jean-Paul Calbimonte, Óscar Corcho, Alasdai...
KCAP
2005
ACM
14 years 3 months ago
An Approach to Ontology Mapping Negotiation
Ontology mapping negotiation aims to achieve consensus among real-world entities about the process of transforming information between different models (ontologies). This paper de...
Nuno Silva, Paulo Maio, João Rocha
FUIN
2010
116views more  FUIN 2010»
13 years 7 months ago
An Investigation of Multi-Agent Planning in CLP
This paper explores the use of Constraint Logic Programming (CLP) as a platform for experimenting with planning problems in the presence of multiple interacting agents. The paper ...
Agostino Dovier, Andrea Formisano, Enrico Pontelli