Sciweavers

9491 search results - page 1765 / 1899
» Modeling Cultural Dynamics
Sort
View
EDBT
2010
ACM
208views Database» more  EDBT 2010»
15 years 5 months ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 4 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
87
Voted
ICN
2009
Springer
15 years 4 months ago
Measuring Route Diversity in the Internet from Remote Vantage Points
Recent works on modeling the Internet topology [8, 9] have highlighted how the complexity of relationships between Autonomous Systems (ASes) can not be oversimplified without sac...
Andrea Di Menna, Tiziana Refice, Luca Cittadini, G...
101
Voted
QI
2009
Springer
117views Physics» more  QI 2009»
15 years 4 months ago
Generalising Unitary Time Evolution
In this third Quantum Interaction (QI) meeting it is time to examine our failures. One of the weakest elements of QI as a field, arises in its continuing lack of models displaying...
Kirsty Kitto, Peter Bruza, Laurianne Sitbon
IAT
2008
IEEE
15 years 4 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
« Prev « First page 1765 / 1899 Last » Next »