Sciweavers

245 search results - page 41 / 49
» pervasive 2008
Sort
View
AAAI
2008
13 years 8 months ago
Using Wiktionary for Computing Semantic Relatedness
We introduce Wiktionary as an emerging lexical semantic resource that can be used as a substitute for expert-made resources in AI applications. We evaluate Wiktionary on the perva...
Torsten Zesch, Christof Müller, Iryna Gurevyc...
ATAL
2008
Springer
13 years 8 months ago
Simulation of sensor-based tracking in Second Life
This paper describes "Second Life" as a novel type of testbed and simulation environment for sensor-based applications. Second Life is a popular virtual online world tha...
Boris Brandherm, Sebastian Ullrich, Helmut Prendin...
ATVA
2008
Springer
90views Hardware» more  ATVA 2008»
13 years 8 months ago
Tree Pattern Rewriting Systems
Classical verification often uses abstraction when dealing with data. On the other hand, dynamic XML-based applications have become pervasive, for instance with the ever growing im...
Blaise Genest, Anca Muscholl, Olivier Serre, Marc ...
CCS
2008
ACM
13 years 8 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
DEON
2008
Springer
13 years 8 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...