Sciweavers

9642 search results - page 1639 / 1929
» Semantics in Multimedia Systems
Sort
View
VLDB
2002
ACM
74views Database» more  VLDB 2002»
14 years 10 months ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
86
Voted
GI
2010
Springer
14 years 9 months ago
Ontology-based Registration of Entities for Data Integration in Large Biomedical Research Projects
Abstract: Large biomedical projects often include workflows running across institutional borders. In these workflows, data describing biomedical entities, such as patients, bio-m...
Toralf Kirsten, Alexander Kiel
90
Voted
ISOLA
2010
Springer
14 years 9 months ago
Towards a Connector Algebra
Interoperability of heterogeneous networked systems has yet to reach the maturity required by ubiquitous computing due to the technology-dependent nature of solutions. The Connect ...
Marco Autili, Chris Chilton, Paola Inverardi, Mart...
JAIR
2010
111views more  JAIR 2010»
14 years 9 months ago
Grounding FO and FO(ID) with Bounds
Grounding is the task of reducing a first-order theory and finite domain to an equivalent propositional theory. It is used as preprocessing phase in many logic-based reasoning s...
Johan Wittocx, Maarten Mariën, Marc Denecker
JCS
2010
112views more  JCS 2010»
14 years 9 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
« Prev « First page 1639 / 1929 Last » Next »