Sciweavers

863 search results - page 55 / 173
» Computational Methods for Intelligent Information Access
Sort
View
CAISE
2004
Springer
15 years 5 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
FLAIRS
2004
15 years 1 months ago
Combining Global and Local Ontology handling in a Multiagent System
Ontologic knowledge is getting more and more important in agent-based systems, and its handling is becoming crucial for successful applications. But placing all the ontologyhandli...
Ramón F. Brena, Hector G. Ceballos
102
Voted
EUROPAR
1999
Springer
15 years 4 months ago
Annotated Memory References: A Mechanism for Informed Cache Management
Processor cycle time continues to decrease faster than main memory access times, placing higher demands on cache memory hierarchy performance. To meet these demands, conventional ...
Alvin R. Lebeck, David R. Raymond, Chia-Lin Yang, ...
FLAIRS
1998
15 years 1 months ago
An AI Approach to Computer Assisted Tomography
Computer assisted tomography (CAT) systems demandlarge amounts of time and space. In this paper, wedescribe an approachto solving the CAT problemusing several AItechniques includi...
John F. Kolen, David A. Shamma, Thomas Reichherzer...
NSPW
2006
ACM
15 years 5 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop