Sciweavers

2795 search results - page 210 / 559
» Recommended or Not
Sort
View
WETICE
2006
IEEE
15 years 9 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
149
Voted
PKDD
2004
Springer
144views Data Mining» more  PKDD 2004»
15 years 9 months ago
SEWeP: A Web Mining System Supporting Semantic Personalization
We present SEWeP, a Web Personalization prototype system that integrates usage data with content semantics, expressed in taxonomy terms, in order to produce a broader yet semantica...
Stratos Paulakis, Charalampos Lampos, Magdalini Ei...
QSIC
2003
IEEE
15 years 9 months ago
A Study of Japanese Software Process Practices and a Potential for Improvement Using SOFL
The goal of this paper is to examine the Japanese experience with the software development process, the challenges they face and how formal engineering methods, in particular SOFL...
Sirin Bekbay, Shaoying Liu
ER
2006
Springer
96views Database» more  ER 2006»
15 years 7 months ago
WSDL RDF Mapping: Developing Ontologies from Standardized XML Languages
The W3C is working on a Recommendation for Web Services Description Language, WSDL 2.0, based on XML. The Working Group is chartered to produce a normative mapping of WSDL into RDF...
Jacek Kopecký
AINA
2003
IEEE
15 years 7 months ago
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate ...
Michael W. David, Kouichi Sakurai