Sciweavers

5227 search results - page 126 / 1046
» Enterprise modeling using class and instance models
Sort
View
CCS
2006
ACM
15 years 8 months ago
Attack graph generation and analysis
In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representati...
Jeannette M. Wing
DAGSTUHL
2007
15 years 5 months ago
Lifetime Extension of Higher Class UHF RFID Tags using special Power Management Techniques and Energy Harvesting Devices
Abstract. Enhanced RFID tag technology especially in the UHF frequency range provides extended functionality like high operating range and sensing and monitoring capabilities. Such...
Alex Janek, Christian Steger, Josef Preishuber-Pfl...
PVLDB
2008
82views more  PVLDB 2008»
15 years 3 months ago
TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering
Trajectory classification, i.e., model construction for predicting the class labels of moving objects based on their trajectories and other features, has many important, real-worl...
Jae-Gil Lee, Jiawei Han, Xiaolei Li, Hector Gonzal...
LMO
1996
15 years 5 months ago
Using Metaobjects to Model Concurrent Objects with PICT
We seek to support the development of open, distributed applications from patible software abstractions. In order to rigorously specify these abstractions, we are elaborating a for...
Markus Lumpe, Jean-Guy Schneider, Oscar Nierstrasz
HOTOS
2003
IEEE
15 years 9 months ago
Towards a Semantic-Aware File Store
—Traditional hierarchical namespaces are not sufficient for representing and managing the rich semantics of today’s storage systems. In this paper, we discuss the principles o...
Zhichen Xu, Magnus Karlsson, Chunqiang Tang, Chris...