Sciweavers

772 search results - page 130 / 155
» Ontology Based Information Integration Using Logic Programmi...
Sort
View
BIOCOMP
2008
15 years 3 months ago
Reverse Engineering Module Networks by PSO-RNN Hybrid Modeling
Background: Inferring a gene regulatory network (GRN) from high throughput biological data is often an under-determined problem and is a challenging task due to the following reas...
Yuji Zhang, Jianhua Xuan, Benildo de los Reyes, Ro...
PERVASIVE
2004
Springer
15 years 7 months ago
Siren: Context-aware Computing for Firefighting
Based on an extensive field study of current firefighting practices, we have developed a system called Siren to support tacit communication between firefighters with multiple level...
Xiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, K...
SACMAT
2009
ACM
15 years 9 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
WWW
2004
ACM
16 years 3 months ago
Personalization in distributed e-learning environments
Personalized support for learners becomes even more important, when e-Learning takes place in open and dynamic learning and information networks. This paper shows how to realize p...
Peter Dolog, Nicola Henze, Wolfgang Nejdl, Michael...
DSN
2005
IEEE
15 years 8 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...