Sciweavers

663 search results - page 28 / 133
» What Is a Concept
Sort
View
SYNTHESE
2010
87views more  SYNTHESE 2010»
13 years 7 months ago
Proofs, pictures, and Euclid
Though pictures are often used to present mathematical arguments, they are not typically thought to be an acceptable means for presenting mathematical arguments rigorously. With re...
John Mumma
CSFW
1999
IEEE
14 years 28 days ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
HICSS
2008
IEEE
138views Biometrics» more  HICSS 2008»
14 years 3 months ago
Cyber Security and Government Fusion Centers
The Department of Homeland Security has recommended the creation of State, Regional, and Community Fusion Centers. These centers, run by state and local governments, are designed ...
Natalie Granado, Gregory White
ICASSP
2009
IEEE
14 years 14 days ago
Summarization of large scale social network activity
This paper presents a novel social media summarization framework. Summarizing media created and shared in large scale online social networks unfolds challenging research problems....
Yu-Ru Lin, Hari Sundaram, Aisling Kelliher
ISIP
2008
IEEE
14 years 3 months ago
An Approach Towards the Integration of Adaptive Business Intelligent and Constraint Programming
Adaptive Business Intelligence is the discipline that combines prediction, optimization and adaptability into a system answering two important questions: What would probably happe...
José Miguel Rubio, Broderick Crawford