Sciweavers

3686 search results - page 429 / 738
» Comprehensive comprehensions
Sort
View
OTM
2005
Springer
15 years 9 months ago
Security Ontology for Annotating Resources
Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ...
Anya Kim, Jim Luo, Myong H. Kang
OTM
2005
Springer
15 years 9 months ago
Middleware for Distributed Context-Aware Systems
Abstract. Context-aware systems represent extremely complex and heterogeneous distributed systems, composed of sensors, actuators, application components, and a variety of context ...
Karen Henricksen, Jadwiga Indulska, Ted McFadden, ...
OTM
2005
Springer
15 years 9 months ago
OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
OTM
2005
Springer
15 years 9 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
OTM
2005
Springer
15 years 9 months ago
Balancing Flexibility and Security in Adaptive Process Management Systems
Abstract. Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to thi...
Barbara Weber, Manfred Reichert, Werner Wild, Stef...