Sciweavers

18697 search results - page 3680 / 3740
» Systemic Security Management
Sort
View
ISMIS
2005
Springer
15 years 9 months ago
A Data Model Based on Paraconsistent Intuitionistic Fuzzy Relations
Abstract. Paraconsistent intuitionistic fuzzy set is an extension of intuitionistic fuzzy set or interval-valued fuzzy set. It relaxes the requirement that t + f ≤ 1, where t is ...
Haibin Wang, Rajshekhar Sunderraman
MKM
2005
Springer
15 years 9 months ago
An Exploration in the Space of Mathematical Knowledge
Abstract. Although knowledge is a central topic for MKM there is little explicit discussion on what ‘knowledge’ might actually be. There are specific intuitions about form and...
Andrea Kohlhase, Michael Kohlhase
RAID
2005
Springer
15 years 9 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
TCGOV
2005
Springer
15 years 9 months ago
Participatory Budget Formation Through the Web
Abstract. We describe a web-based system to support groups in elaborating participatory budgets. Rather than using physical meetings with voting mechanisms, we promote virtual meet...
Jesus Rios, David Ríos Insua, E. Fernandez,...
CSCW
2004
ACM
15 years 9 months ago
Lessons from the reMail prototypes
Electronic mail has become the most widely-used application for business productivity and communication, yet many people are frustrated with their email. Though email usage has ch...
Dan Gruen, Steven L. Rohall, Suzanne O. Minassian,...
« Prev « First page 3680 / 3740 Last » Next »