Sciweavers

45 search results - page 2 / 9
» How to Foresee and Capture the Effects of RFID Implementatio...
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
ERCIMDL
2006
Springer
130views Education» more  ERCIMDL 2006»
13 years 9 months ago
Digital Object Prototypes: An Effective Realization of Digital Object Types
Digital Object Prototypes (DOPs) provide the DL designer with the ability to model diverse types of digital objects in a uniform manner while offering digital object type conforman...
Kostas Saidis, George Pyrounakis, Mara Nikolaidou,...
HT
1991
ACM
13 years 8 months ago
Implementing Hypertext Database Relationships through Aggregations and Exceptions
In order to combine hypertext with database facilities, we show how to extract an effective storage structure from given instance relationships. The schema of the structure recogn...
Yoshinori Hara, Arthur M. Keller, Gio Wiederhold
EXPERT
2002
146views more  EXPERT 2002»
13 years 5 months ago
The Frame-Based Module of the SUISEKI Information Extraction System
names in the same abstract already indicates a relation between them. Because of its simplicity, we can apply this approach to large amounts of text and establish interaction netwo...
Christian Blaschke, Alfonso Valencia
WSC
2001
13 years 6 months ago
An agent architecture for implementing command and control in military simulations
In models of military operations it is important to include the Command and Control (C2) process in order to achieve a realistic simulation of a military force's behaviour an...
Colin R. Mason, James Moffat