Sciweavers

486 search results - page 58 / 98
» Knowledge Structuring and Evaluation Based on Grey Theory
Sort
View
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
15 years 4 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
CIKM
2008
Springer
14 years 11 months ago
Learning to link with wikipedia
This paper describes how to automatically cross-reference documents with Wikipedia: the largest knowledge base ever known. It explains how machine learning can be used to identify...
David N. Milne, Ian H. Witten
CCS
2005
ACM
15 years 3 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
ICDT
2012
ACM
226views Database» more  ICDT 2012»
13 years 5 days ago
Factorised representations of query results: size bounds and readability
We introduce a representation system for relational data based on algebraic factorisation using distributivity of product over union and commutativity of product and union. We giv...
Dan Olteanu, Jakub Zavodny
VTC
2010
IEEE
415views Communications» more  VTC 2010»
14 years 8 months ago
System Level Simulation of LTE Networks
—In order to evaluate the performance of new mobile network technologies, system level simulations are crucial. They aim at determining whether, and at which level predicted link...
Josep Colom Ikuno, Martin Wrulich, Markus Rupp