Sciweavers

255 search results - page 43 / 51
» Principles for Entity Authentication
Sort
View
JODS
2006
148views Data Mining» more  JODS 2006»
13 years 7 months ago
Discovering the Semantics of Relational Tables Through Mappings
Abstract. Many problems in Information and Data Management require a semantic account of a database schema. At its best, such an account consists of formulas expressing the relatio...
Yuan An, Alexander Borgida, John Mylopoulos
JNW
2007
149views more  JNW 2007»
13 years 7 months ago
Adaptive Semantic Middleware for Mobile Environments
— Context-awareness is considered a key driving principle for the design and provisioning of adaptable pervasive services. Rightfully describing and interpreting context, however...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
JSW
2007
191views more  JSW 2007»
13 years 7 months ago
Building Self-Configuring Data Centers with Cross Layer Coevolution
Abstract—This paper describes a biologically-inspired architecture, called SymbioticSphere, which allows data centers to autonomously adapt to dynamic environmental changes. Symb...
Paskorn Champrasert, Junichi Suzuki
SAJ
2000
129views more  SAJ 2000»
13 years 7 months ago
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments
The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever...
Stephen Perelson, Reinhardt A. Botha
WCRE
2010
IEEE
13 years 5 months ago
Immediacy through Interactivity: Online Analysis of Run-time Behavior
—Visualizations of actual run-time data support the comprehension of programs, like examples support the ion of abstract concepts and principles. Unfortunately, the required run-...
Michael Perscheid, Bastian Steinert, Robert Hirsch...