Sciweavers

1195 search results - page 30 / 239
» What, Where
Sort
View
RE
2002
Springer
13 years 7 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
MKM
2009
Springer
14 years 2 months ago
A Review of Mathematical Knowledge Management
Mathematical Knowledge Management (MKM), as a field, has seen tremendous growth in the last few years. This period was one where many research threads were started and the field ...
Jacques Carette, William M. Farmer
AH
2008
Springer
14 years 1 months ago
Modelling Semantic Relationships and Centrality to Facilitate Community Knowledge Sharing
Some of today’s most widely spread applications are social systems where people can form communities and share knowledge. However, knowledge sharing is not always effective and c...
Styliani Kleanthous, Vania Dimitrova
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 1 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
DIGRA
2005
Springer
14 years 1 months ago
Law, order and conflicts of interest in massively multiplayer online games
In huge online games where great numbers of players can be connected at the same time, social interaction is complex and conflicts become part of everyday life. There is a set of ...
Daniel Pargman, Andreas Eriksson