Sciweavers

772 search results - page 130 / 155
» Ontology Based Information Integration Using Logic Programmi...
Sort
View
149
Voted
BIOCOMP
2008
15 years 4 months ago
Reverse Engineering Module Networks by PSO-RNN Hybrid Modeling
Background: Inferring a gene regulatory network (GRN) from high throughput biological data is often an under-determined problem and is a challenging task due to the following reas...
Yuji Zhang, Jianhua Xuan, Benildo de los Reyes, Ro...
108
Voted
PERVASIVE
2004
Springer
15 years 8 months ago
Siren: Context-aware Computing for Firefighting
Based on an extensive field study of current firefighting practices, we have developed a system called Siren to support tacit communication between firefighters with multiple level...
Xiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, K...
164
Voted
SACMAT
2009
ACM
15 years 9 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
127
Voted
WWW
2004
ACM
16 years 3 months ago
Personalization in distributed e-learning environments
Personalized support for learners becomes even more important, when e-Learning takes place in open and dynamic learning and information networks. This paper shows how to realize p...
Peter Dolog, Nicola Henze, Wolfgang Nejdl, Michael...
98
Voted
DSN
2005
IEEE
15 years 8 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...