Sciweavers

1486 search results - page 246 / 298
» Firewall Rules Analysis
Sort
View
ER
2004
Springer
161views Database» more  ER 2004»
15 years 5 months ago
Applying the Application-Based Domain Modeling Approach to UML Structural Views
Being part of domain engineering, domain analysis enables identifying domains and capturing their ontologies in order to assist and guide system developers to design domain-specifi...
Arnon Sturm, Iris Reinhartz-Berger
ICWE
2004
Springer
15 years 5 months ago
Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining
Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more comple...
Long Wang 0002, Christoph Meinel
SDMW
2004
Springer
15 years 5 months ago
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms
Abstract. Due to the growing interest in XML security, various access control schemes have been proposed recently. However, little effort has been put forth to facilitate a unifor...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
15 years 5 months ago
On the Limits of Bottom-Up Computer Simulation: Towards a Nonlinear Modeling Culture
1 In the complexity and simulation communities there is growing support for the use of bottom-up computer-based simulation in the analysis of complex systems. The presumption is th...
Kurt A. Richardson
RIDE
2003
IEEE
15 years 5 months ago
Event Information Extraction Using Link Grammar
In this paper, we present a scheme for identifying instances of events and extracting information about them. The scheme can handle all events with which an action can be associat...
Harsha V. Madhyastha, N. Balakrishnan, K. R. Ramak...