Sciweavers

245 search results - page 41 / 49
» pervasive 2008
Sort
View
AAAI
2008
14 years 11 months ago
Using Wiktionary for Computing Semantic Relatedness
We introduce Wiktionary as an emerging lexical semantic resource that can be used as a substitute for expert-made resources in AI applications. We evaluate Wiktionary on the perva...
Torsten Zesch, Christof Müller, Iryna Gurevyc...
ATAL
2008
Springer
14 years 11 months ago
Simulation of sensor-based tracking in Second Life
This paper describes "Second Life" as a novel type of testbed and simulation environment for sensor-based applications. Second Life is a popular virtual online world tha...
Boris Brandherm, Sebastian Ullrich, Helmut Prendin...
ATVA
2008
Springer
90views Hardware» more  ATVA 2008»
14 years 11 months ago
Tree Pattern Rewriting Systems
Classical verification often uses abstraction when dealing with data. On the other hand, dynamic XML-based applications have become pervasive, for instance with the ever growing im...
Blaise Genest, Anca Muscholl, Olivier Serre, Marc ...
CCS
2008
ACM
14 years 11 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
DEON
2008
Springer
14 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...