Sciweavers

2381 search results - page 400 / 477
» On Ordering Descriptions in a Description Logic
Sort
View
EGC
2005
Springer
15 years 7 months ago
Security Architecture for Open Collaborative Environment
Abstract. The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the...
Yuri Demchenko, Leon Gommans, Cees de Laat, Bas va...
ICCNMC
2005
Springer
15 years 7 months ago
Simplified Message Transformation for Optimization of Message Processing in 3G-324M Control Protocol
3G-324M is a multimedia transmission protocol designed for 3G communication environment. Meanwhile H.245 standard is a control protocol in 3G-324M and gives specific descriptions a...
Man-Ching Yuen, Ji Shen, Weijia Jia, Bo Han
ICDT
2005
ACM
95views Database» more  ICDT 2005»
15 years 7 months ago
Semantics of Data Streams and Operators
What does a data stream mean? Much of the extensive work on query operators and query processing for data streams has proceeded without the benefit of an answer to this question. ...
David Maier, Jin Li, Peter A. Tucker, Kristin Tuft...
WEBI
2005
Springer
15 years 7 months ago
Efficient Extraction of Closed Motivic Patterns in Multi-Dimensional Symbolic Representations of Music
In this paper, we present an efficient model for discovering repeated patterns in symbolic representations of music. Combinatorial redundancy inherent to the pattern discovery pa...
Olivier Lartillot
NSPW
2004
ACM
15 years 7 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman