Sciweavers

10 search results - page 2 / 2
» A Three-Level Approach for Analyzing User Behavior in Ongoin...
Sort
View
AAAI
2006
13 years 6 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
PERCOM
2009
ACM
14 years 3 days ago
An Empirical Analysis of Wi-Fi Activity in Three Urban Scenarios
—A better understanding of people’s daily behaviors with respect to the underlying wireless network is a crucial step toward Wi-Fi based pervasive networking. Existing analyses...
Thomas Claveirole, Mathias Boc, Marcelo Dias de Am...
ICAC
2006
IEEE
13 years 11 months ago
Discovering Likely Invariants of Distributed Transaction Systems for Autonomic System Management
Large amount of monitoring data can be collected from distributed systems as the observables to analyze system behaviors. However, without reasonable models to characterize systems...
Guofei Jiang, Haifeng Chen, Kenji Yoshihira
WWW
2008
ACM
14 years 6 months ago
Value-driven design for "infosuasive" web applications
An infosuasive web application is mainly intended to be at the same time informative and persuasive, i.e., it aims at supporting knowledge needs and it has also the (declared or n...
Davide Bolchini, Franca Garzotto, Paolo Paolini
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 6 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...