Sciweavers

2795 search results - page 395 / 559
» Recommendations on recommendations
Sort
View
SWS
2004
ACM
14 years 3 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
WS
2004
ACM
14 years 3 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
ARCS
2004
Springer
14 years 3 months ago
Heterogenous Data Fusion via a Probabilistic Latent-Variable Model
In a pervasive computing environment, one is facing the problem of handling heterogeneous data from different sources, transmitted over heterogeneous channels and presented on het...
Kai Yu, Volker Tresp
AWIC
2004
Springer
14 years 3 months ago
An Agent Based System for the Contextual Retrieval of Medical Information
As in any other organization, hospital personnel absorb information from their environment, turn it into knowledge, and then make decisions based on it. Hospital Information System...
Marcela Rodríguez, Alfredo Preciado
CAISE
2004
Springer
14 years 3 months ago
UML for Ontology Modelling and Interoperability
The Semantic Web vision aims to integrate and convert the vast amount of information available on the Internet into a machine-understandable network. The objective is to promote kn...
Vandana Kabilan, Paul Johannesson