Sciweavers

1407 search results - page 133 / 282
» Systems Theory Model for Information Security
Sort
View
ESORICS
2002
Springer
14 years 7 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
ATAL
2005
Springer
14 years 1 months ago
A multiagent system manages collaboration in emergent processes
Emergent processes are non-routine, collaborative business processes whose execution is guided by the knowledge that emerges during a process instance. In so far as the process go...
John K. Debenham
OPODIS
2004
13 years 9 months ago
Embedded Systems - Challenges and Work Directions
Embedded Systems are components integrating software and hardware jointly and specifically designed to provide given functionalities. These components may be used in many different...
Joseph Sifakis
CIKM
2008
Springer
13 years 10 months ago
Ranked feature fusion models for ad hoc retrieval
We introduce the Ranked Feature Fusion framework for information retrieval system design. Typical information retrieval formalisms such as the vector space model, the bestmatch mo...
Jeremy Pickens, Gene Golovchinsky
CIVR
2007
Springer
104views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Semantic facets: an in-depth analysis of a semantic image retrieval system
This paper introduces a faceted model of image semantics which attempts to express the richness of semantic content interpretable within an image. Using a large image data-set fro...
Jonathon S. Hare, Paul H. Lewis, Peter G. B. Enser...