Sciweavers

16 search results - page 3 / 4
» An Ontological Approach to the Document Access Problem of In...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 9 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
DIM
2005
ACM
13 years 7 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
JCDL
2010
ACM
126views Education» more  JCDL 2010»
13 years 5 months ago
Discovering Australia's research data
Access to data crucial to research is often slow and difficult. When research problems cross disciplinary boundaries, problems are exacerbated. This paper argues that it is import...
Stefanie Kethers, Xiaobin Shen, Andrew E. Treloar,...
SEMWEB
2009
Springer
13 years 12 months ago
Populating the Semantic Web by Macro-reading Internet Text
A key question regarding the future of the semantic web is “how will we acquire structured information to populate the semantic web on a vast scale?” One approach is to enter t...
Tom M. Mitchell, Justin Betteridge, Andrew Carlson...
W2GIS
2007
Springer
13 years 11 months ago
A Theoretical Grounding for Semantic Descriptions of Place
This paper is motivated by the problem of how to provide better access to ever enlarging collections of digital images. The paper opens by examining the concept of place in geograp...
Alistair J. Edwardes, Ross S. Purves