Sciweavers

5671 search results - page 1103 / 1135
» A Semantic Approach to Interpolation
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
DASFAA
2007
IEEE
187views Database» more  DASFAA 2007»
15 years 4 months ago
OntoDB: An Ontology-Based Database for Data Intensive Applications
Recently, several approaches and systems were proposed to store in the same database data and the ontologies describing their meanings. We call these databases, ontology-based data...
Dehainsala Hondjack, Guy Pierra, Ladjel Bellatrech...
IEEEARES
2007
IEEE
15 years 4 months ago
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
BTW
2007
Springer
142views Database» more  BTW 2007»
15 years 3 months ago
Getting Prime Cuts from Skylines over Partially Ordered Domains
: Skyline queries have recently received a lot of attention due to their intuitive query formulation: users can state preferences with respect to several attributes. Unlike numeric...
Wolf-Tilo Balke, Wolf Siberski, Ulrich Güntze...
CIA
2007
Springer
15 years 3 months ago
Learning Initial Trust Among Interacting Agents
Trust learning is a crucial aspect of information exchange, negotiation, and any other kind of social interaction among autonomous agents in open systems. But most current probabil...
Achim Rettinger, Matthias Nickles, Volker Tresp
« Prev « First page 1103 / 1135 Last » Next »