Sciweavers

2097 search results - page 242 / 420
» Knowledge Base Maintenance through Knowledge Representation
Sort
View
137
Voted
ER
2009
Springer
166views Database» more  ER 2009»
15 years 11 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
ICALT
2006
IEEE
15 years 10 months ago
Automatic Generation of Metadata for Learning Objects
Proper reuse of learning objects depends both on the amount and quality of attached semantic metadata such as “learning objective”', “related concept”, etc. Manually ...
Paramjeet Singh Saini, Marco Ronchetti, Diego Sona
140
Voted
ICIP
1995
IEEE
15 years 8 months ago
Multi-channel restoration of electron micrographs
We introduce a projection based multi-channel restoration method which is useful in cases for which there is no a priori information about the input signal. The method is especial...
M. Vrhel, B. L. Trus
PDPTA
2003
15 years 6 months ago
Misuse Detection for Information Retrieval Systems: A Preliminary Approach
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
132
Voted
IJIM
2007
102views more  IJIM 2007»
15 years 4 months ago
Potentials and Challenges of Mobile Media in Museums
In this article we discuss potential scenarios of use for mobile media in museums and the challenges they pose. We examine how the characteristics of mobile technology suit the sp...
Daniel Wessel, Eva Mayr