Sciweavers

849 search results - page 133 / 170
» Reactive Rules on the Web
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
IDEAS
2009
IEEE
232views Database» more  IDEAS 2009»
14 years 2 months ago
RDFKB: efficient support for RDF inference queries and knowledge management
RDFKB (Resource Description Framework Knowledge Base) is a relational database system for RDF datasets which supports inference and knowledge management. Significant research has ...
James P. McGlothlin, Latifur R. Khan
ADBIS
2006
Springer
81views Database» more  ADBIS 2006»
14 years 1 months ago
SDQNET: Semantic Distributed Querying in Loosely Coupled Data Sources
Web communities involve networks of loosely coupled data sources. Members in those communities should be able to pose queries and gather results from all data sources in the networ...
Eirini Spyropoulou, Theodore Dalamagas
EKAW
2004
Springer
14 years 1 months ago
Graph-Based Acquisition of Expressive Knowledge
Capturing and exploiting knowledge is at the heart of several important problems such as decision making, the semantic web, and intelligent agents. The captured knowledge must be a...
Vinay K. Chaudhri, Kenneth S. Murray, John Pacheco...