Sciweavers

762 search results - page 96 / 153
» Modeling and Simulating Information Security Management
Sort
View
CONTEXT
2007
Springer
14 years 2 months ago
Ontologies as Contexts for Constraint-based Reasoning
We give a brief description of a system we are currently building that fulfils the promise of our title. This description also indicates why we are interested in the topic of cont...
Richard J. Wallace, Tomas Eric Nordlander, Ioannis...
DRM
2008
Springer
13 years 9 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
JCP
2006
173views more  JCP 2006»
13 years 7 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
CARS
2001
13 years 9 months ago
Design of a neurosurgical procedure model for multimodal image-guided surgery
: In multimodal image-guided surgery, surgeons have to manage large amounts of information (i.e. images) to plan and perform the surgical procedure. To facilitate management we att...
Pierre Jannin, M. Raimbault, Xavier Morandi, E. Se...
ITNG
2010
IEEE
14 years 28 days ago
Applying Semantic Web Techniques to Reservoir Engineering: Challenges and Experiences from Event Modeling
—In reservoir engineering domain experts deal with many tasks and operations, ranging from reservoir simulation to well maintenance scheduling, with the goal of maximizing oil pr...
Tao Zhu, Amol Bakshi, Viktor K. Prasanna, Karthik ...