Sciweavers

3516 search results - page 331 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ICCSA
2009
Springer
15 years 11 months ago
Designing Data Warehouses for Geographic OLAP Querying by Using MDA
Data aggregation in Geographic Information Systems (GIS) is a desirable feature, spatial data are integrated in OLAP engines for this purpose. However, the development and operatio...
Octavio Glorio, Juan Trujillo
PETRA
2010
ACM
15 years 2 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
SACMAT
2003
ACM
15 years 9 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
EDBTW
2010
Springer
15 years 9 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
WWW
2004
ACM
16 years 4 months ago
Using semantic web approach in augmented audio reality system for museum visitors
In this paper, we describe our work in progress on the reasoning module of ec(h)o, an augmented audio-reality interface for museum visitors utilizing spatialized soundscapes and a...
Leila Kalantari, Marek Hatala, Jordan Willms