Sciweavers

705 search results - page 110 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 1 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
WWW
2005
ACM
15 years 10 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
JODS
2006
206views Data Mining» more  JODS 2006»
14 years 9 months ago
Emergent Semantics in Knowledge Sifter: An Evolutionary Search Agent Based on Semantic Web Services
This paper addresses the various facets of emergent semantics in content retrieval systems such as Knowledge Sifter, an architecture and system based on the use of specialized agen...
Larry Kerschberg, Hanjo Jeong, Wooju Kim
VLC
2008
156views more  VLC 2008»
14 years 9 months ago
An agent-based framework for sketched symbol interpretation
Recognizing hand-sketched symbols is a definitely complex problem. The input drawings are often intrinsically ambiguous, and require context to be interpreted in a correct way. Ma...
Giovanni Casella, Vincenzo Deufemia, Viviana Masca...
SACMAT
2005
ACM
15 years 3 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...