Sciweavers

1053 search results - page 114 / 211
» The Rules of Virtual Groups
Sort
View
WISE
2000
Springer
15 years 3 months ago
Object-Oriented Mediator Queries to XML Data
The mediator/wrapper approach is used to integrate data from different databases and other data sources by introducing a middleware virtual database that provides high level abstr...
Hui Lin, Tore Risch, Timour Katchaounov
AIIA
2005
Springer
15 years 1 months ago
Argumentation for Access Control
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual orga...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
KBS
2007
101views more  KBS 2007»
14 years 11 months ago
A Knowledge Base for the maintenance of knowledge extracted from web data
By applying web mining tools, significant patterns about the visitor behavior can be extracted from data originated in web sites. Supported by a domain expert, the patterns are v...
Juan D. Velásquez, Vasile Palade
COMCOM
2000
125views more  COMCOM 2000»
14 years 11 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
EDBT
2008
ACM
144views Database» more  EDBT 2008»
15 years 11 months ago
Protecting privacy in recorded conversations
Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora ex...
Scot Cunningham, Traian Marius Truta