Sciweavers

1555 search results - page 142 / 311
» Using Macromodels to Manage Collections of Related Models
Sort
View
125
Voted
EDBT
2009
ACM
149views Database» more  EDBT 2009»
14 years 10 months ago
Towards integrated and efficient scientific sensor data processing: a database approach
In this work, we focus on managing scientific environmental data, which are measurement readings collected from wireless sensors. In environmental science applications, raw sensor...
Ji Wu, Yongluan Zhou, Karl Aberer, Kian-Lee Tan
COMPSEC
2004
115views more  COMPSEC 2004»
15 years 14 days ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart
144
Voted
DB
2011
14 years 12 days ago
Open source software adoption: motivations of adopters and amotivations of non-adopters
Adoption of an information system could be reflected in two ways: through the adoption intentions of the non-adopters and the extent of adoption for the adopters. This study seeks...
Yan Li, Chuan-Hoo Tan, Heng Xu, Hock-Hai Teo
101
Voted
SACMAT
2005
ACM
15 years 6 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
108
Voted
ECSA
2010
Springer
15 years 24 days ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...