Sciweavers

545 search results - page 52 / 109
» expert 2008
Sort
View
IEEESCC
2008
IEEE
14 years 2 months ago
A Risk Reduction Framework for Dynamic Workflows
Workflows tend to fail in real-world scenarios due to the uncertain/unreliable sensory information which sometimes needs to be updated during the execution of workflows. In a lo...
Prabhdeep Singh, Fatih Gelgi, Hasan Davulcu, Steph...
IJCNN
2008
IEEE
14 years 2 months ago
Building meta-learning algorithms basing on search controlled by machine complexity
Abstract— Meta-learning helps us find solutions to computational intelligence (CI) challenges in automated way. Metalearning algorithm presented in this paper is universal and m...
Norbert Jankowski, Krzysztof Grabczewski
ITNG
2008
IEEE
14 years 2 months ago
Prototype Generation from Ontology Charts
Semantic Analysis is a business analysis method designed to capture user requirements and represent them as text or in a graph that is called Ontology Chart. Ontology Charts can b...
George Tsaramirsis, Iman Poernomo
SECURWARE
2008
IEEE
14 years 2 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 2 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis