Sciweavers

5970 search results - page 919 / 1194
» Management Information Model Engineering
Sort
View
WPES
2003
ACM
15 years 10 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
DEXAW
2009
IEEE
113views Database» more  DEXAW 2009»
15 years 11 months ago
Identification of Surgery Indicators by Mining Hospital Data: A Preliminary Study
—The management of patient referrals is an interesting issue when it comes to predicting future patient demand to increase hospital productivity. In general, a patient is referre...
Marie Persson, Niklas Lavesson
SAC
2004
ACM
15 years 10 months ago
Integrating similarity-based queries in image DBMSs
Until recently, issues in image retrieval have been handled in DBMSs and in computer vision as separate research works. Nowadays, the trend is towards integrating the two approach...
Solomon Atnafu, Richard Chbeir, David Coquil, Lion...
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
15 years 6 months ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
BPM
2009
Springer
157views Business» more  BPM 2009»
15 years 6 months ago
ProM: The Process Mining Toolkit
Nowadays, all kinds of information systems store detailed information in logs. Examples of such systems include classical workflow management systems (Staffware), ERP systems (SAP)...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...