Sciweavers

322 search results - page 25 / 65
» Modelling and Reasoning Languages for Social Networks Polici...
Sort
View
ASUNAM
2011
IEEE
12 years 7 months ago
Locating Central Actors in Co-offending Networks
—A co-offending network is a network of offenders who have committed crimes together. Recently different researches have shown that there is a fairly strong concept of network am...
Mohammad A. Tayebi, Laurens Bakker, Uwe Gläss...
APCCM
2008
13 years 9 months ago
Survey of Existing Languages to Model Interactive Web Applications
Over the last few years, the web is establishing increased importance in society with the rise of social networking sites and the semantic web, facilitated and driven by the popul...
Jevon M. Wright, Jens Dietrich
MASCOTS
2004
13 years 8 months ago
Size-Based Scheduling Policies with Inaccurate Scheduling Information
Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
Dong Lu, Huanyuan Sheng, Peter A. Dinda
UM
2009
Springer
14 years 1 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 8 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald