標(biāo)題: Titlebook: On the Move to Meaningful Internet Systems: OTM 2008; OTM Confederated Int Robert Meersman,Zahir Tari Conference proceedings 2008 Springer- [打印本頁] 作者: solidity 時間: 2025-3-21 17:16
書目名稱On the Move to Meaningful Internet Systems: OTM 2008影響因子(影響力)
書目名稱On the Move to Meaningful Internet Systems: OTM 2008影響因子(影響力)學(xué)科排名
書目名稱On the Move to Meaningful Internet Systems: OTM 2008網(wǎng)絡(luò)公開度
書目名稱On the Move to Meaningful Internet Systems: OTM 2008網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱On the Move to Meaningful Internet Systems: OTM 2008被引頻次
書目名稱On the Move to Meaningful Internet Systems: OTM 2008被引頻次學(xué)科排名
書目名稱On the Move to Meaningful Internet Systems: OTM 2008年度引用
書目名稱On the Move to Meaningful Internet Systems: OTM 2008年度引用學(xué)科排名
書目名稱On the Move to Meaningful Internet Systems: OTM 2008讀者反饋
書目名稱On the Move to Meaningful Internet Systems: OTM 2008讀者反饋學(xué)科排名
作者: Middle-Ear 時間: 2025-3-21 21:48 作者: 碎石 時間: 2025-3-22 01:31 作者: 說笑 時間: 2025-3-22 07:22
TrustMAS: Trusted Communication Platform for Multi-Agent Systemsls are used to exchange routing tables between StegAgents. Thus all StegAgents in TrustMAS with their ability to exchange information by using hidden channels form distributed steganographic router (Steg-router).作者: 荒唐 時間: 2025-3-22 12:21
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approachual level into Platform Specific Models (PSM) at the logical level by defining the necessary set of Query/Views/Transformations (QVT) rules. This PSM model is therefore used to obtain the corresponding secure multidimensional code for a specific On-Line Analytical Processing (OLAP) platform such as SQL Server Analysis Services (SSAS).作者: ASSAY 時間: 2025-3-22 12:52
PuRBAC: Purpose-Aware Role-Based Access Controlraints and obligations) with clear semantics for enforcement, and leverages hybrid hierarchies for roles and purposes for enforcing fine grained purpose and role based access control to ensure privacy protection.作者: 著名 時間: 2025-3-22 19:40
Boosting Web Intrusion Detection Systems by Inferring Positive Signatures” ones based on the inference of a regular language. We support our proposal by realizing Sphinx, an anomaly-based intrusion detection system based on it. Thorough benchmarks show that Sphinx performs better than current state-of-the-art systems, both in terms of false positives/false negatives as well as needing a shorter training period.作者: faultfinder 時間: 2025-3-23 01:15 作者: 壯觀的游行 時間: 2025-3-23 03:10 作者: SLAG 時間: 2025-3-23 06:50 作者: Diskectomy 時間: 2025-3-23 10:14
A Novel Worm Detection Model Based on Host Packet Behavior Rankingns to the worm detection: 1) presenting a hierarchical user habit model; 2) using normal software and time profile to eliminate the worm-like P2P traffic and accelerate the detection of worms; 3) presenting HPBRWD to effectively detect worms. Experiments results show that HPBRWD is effective to detect worms.作者: 不愿 時間: 2025-3-23 16:56
Computing Exact Outcomes of Multi-parameter Attack Treesral possible optimisations and evaluate the result experimentally. Finally, we also prove the consistency of our computations in the framework of Mauw and Oostdijk and discuss the need to extend the framework.作者: 散布 時間: 2025-3-23 20:47
Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systemslary (tags) and helps to build a more flexible access control mechanism based on relationships among different types of users. We also present a prototype, a gadget called Uncle-Share, which we have developed to enable this access control mechanism and evaluate it.作者: 上流社會 時間: 2025-3-23 23:09 作者: Asseverate 時間: 2025-3-24 04:04
Ten Challenges for Ontology Matchinghe help of examples. Then, we present general trends of the field and discuss ten challenges for ontology matching, thereby aiming to direct research into the critical path and to facilitate progress of the field.作者: 斜谷 時間: 2025-3-24 08:37 作者: Cpap155 時間: 2025-3-24 13:52
Boosting Web Intrusion Detection Systems by Inferring Positive Signaturesf the monitored web application in two groups: the “regular” and the “irregular” ones, and applying a new method for anomaly detection on the “regular” ones based on the inference of a regular language. We support our proposal by realizing Sphinx, an anomaly-based intrusion detection system based on作者: 譏諷 時間: 2025-3-24 15:04
Principal Components of Port-Address Matrices in Port-Scan Analysisnew methods for reducing the traffic data to a simplified form comprising significant components of smaller dimensionality. (1) Dimension reduction via Term Frequency – Inverse Document Frequency (TF-IDF) values, a technique used in information retrieval, is used to choose significant ports and addr作者: 任命 時間: 2025-3-24 21:35
A Novel Worm Detection Model Based on Host Packet Behavior Ranking to address these problems, this paper first presents a user habit model to describe the factors which influent the generation of network traffic, then a design of HPBRWD (Host Packet Behavior Ranking Based Worm detection) and some key issues about it are introduced. This paper has three contributio作者: NUL 時間: 2025-3-24 23:16 作者: dagger 時間: 2025-3-25 07:17
Steganography of VoIP StreamsApart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols’ fields and is known for IP, UDP or TCP protocols but has never been applied to RTP (Real-Time Tran作者: 眉毛 時間: 2025-3-25 10:32 作者: plasma 時間: 2025-3-25 15:37 作者: prostatitis 時間: 2025-3-25 16:25
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach development process is also highly important as unauthorized users may discover vital business information. Model Driven Architecture (MDA) based approaches allow us to define models at different abstraction levels, along with the automatic transformations between them. This has thus led to the def作者: Predigest 時間: 2025-3-25 23:48
Trusted Reputation Management Service for Peer-to-Peer Collaborationructed to ensure file authenticity and stimulate collaboration. We identify the authenticity, availability and privacy issues concerning the previous reputation management schemes. We propose to add integrity control for the reputation storage/computation processing in order to enhance the authentic作者: Acumen 時間: 2025-3-26 01:05 作者: Confidential 時間: 2025-3-26 05:11
PuRBAC: Purpose-Aware Role-Based Access Controlprivacy requirements should be captured in access control systems. In this paper, we extend the role-based access control (RBAC) model to capture privacy requirements of an organization. The proposed purpose-aware RBAC extension treats purpose as a central entity in RBAC. The model assigns permissio作者: transdermal 時間: 2025-3-26 09:02 作者: SHOCK 時間: 2025-3-26 16:23
Verifying Extended Criteria for the Interoperability of Security Devicesates are currently working to this aim. Therefore, tens of millions of smart cards, based on hardware devices provided by many different manufacturers, will be distributed all over the world, and used in particular to accomplish the security tasks of . and .. In this context, the so called . define 作者: VEIL 時間: 2025-3-26 20:10
Generating a Large Prime Factor of , ,±, ,?+?1 in Polynomial Time.) is the .???. cyclotomic polynomial and .?=?3 or .?=?6. An unconditionally polynomial time algorithm for generating primes of the above form is not yet known. Generating primes of such form is essential for the GH and the CEILIDH Public Key Systems, since they are key parameters in these cryptosys作者: 勤勉 時間: 2025-3-26 21:10
ODBASE 2008 PC Co–chairs’ Message, Mexico, November 11 – 13, 2008..We are now moving towards meaningful Internet systems and ubiquitous computing, earmarking the significant transitions of semantic technologies in the years since the first ODBASE conference in 2002. Recent methods allow us to scale semantic technologies to handle t作者: nocturia 時間: 2025-3-27 01:39
Artifact-Centric Business Process Models: Brief Survey of Research Results and Challengesd framework for a class of data-centric business process models, which are based on “business artifacts”. The paper provides a brief survey of research results on artifact-centric business process, and identifies a broad array of remaining research challenges.作者: Incorruptible 時間: 2025-3-27 09:00
Ten Challenges for Ontology Matchingte many component matching solutions that have been developed so far, there is no integrated solution that is a clear success, which is robust enough to be the basis for future development, and which is usable by non expert users. In this paper we first provide the basics of ontology matching with t作者: Atrium 時間: 2025-3-27 11:34 作者: 錯誤 時間: 2025-3-27 17:15
Maciej Grze?kowiaktsache, die ?rgerlich macht, denn gemischte Führungsteams sind erfolgreicher als homogene. Unternehmen, die das erkannt haben, setzen auf eine im Unternehmen sichtbare Strategie, um Frauenkarrieren zu f?rdern. Dazu gibt es noch mehr Handlungsfelder als die vielfach diskutierten Arbeitszeit- und Kind作者: 一加就噴出 時間: 2025-3-27 18:30 作者: 規(guī)范就好 時間: 2025-3-27 22:09
Pavel Shvaiko,Jér?me Euzenate Spiele zuhauf. Frauen treten bei Machtspielen im Unternehmenskontext oftmals zum Ausw?rtsspiel an, erkennen sie zu sp?t oder versuchen, sie zu meiden..In ein Machtspiel verwickelt zu werden, hat auch positive Komponenten: Ich werde als Sparringspartnerin ernst genommen und m?glicherweise als Konku作者: Fecundity 時間: 2025-3-28 04:03
Maggie Duong,Yanchun Zhange Spiele zuhauf. Frauen treten bei Machtspielen im Unternehmenskontext oftmals zum Ausw?rtsspiel an, erkennen sie zu sp?t oder versuchen, sie zu meiden..In ein Machtspiel verwickelt zu werden, hat auch positive Komponenten: Ich werde als Sparringspartnerin ernst genommen und m?glicherweise als Konku作者: Gastric 時間: 2025-3-28 09:04 作者: 低能兒 時間: 2025-3-28 12:58 作者: 增長 時間: 2025-3-28 16:00 作者: Armory 時間: 2025-3-28 18:43
Krzysztof Szczypiorski,Igor Margasiński,Wojciech Mazurczyk,Krzysztof Cabaj,Pawe? Radziszewski作者: originality 時間: 2025-3-29 00:48
Carlos Blanco,Ignacio García-Rodríguez de Guzmán,Eduardo Fernández-Medina,Juan Trujillo,Mario Piatti作者: Isolate 時間: 2025-3-29 06:06
Maurizio Talamo,Franco Arcieri,Giuseppe Della Penna,Andrea Dimitri,Benedetto Intrigila,Daniele Magaz作者: 教育學(xué) 時間: 2025-3-29 07:20 作者: languor 時間: 2025-3-29 13:13
Anonymous Resolution of DNS Querieseries by means of, for instance, man-in-the-middle or replay attacks. However, this limitation can be successfully solved combining our proposal together with the use of the DNSSEC (DNS Security extensions). We evaluate the impact of including this complementary countermeasure.作者: 地名詞典 時間: 2025-3-29 18:31
Trusted Reputation Management Service for Peer-to-Peer Collaborationamper-proof way by the Trusted Reputation Agent (TRA) on the same platform, which guarantees the authenticity of reputation values. Transaction partners exchange directly with each other for reputation values, services and transaction comments with no reliance on a remote third party, ensuring the a作者: 影響 時間: 2025-3-29 20:47 作者: enhance 時間: 2025-3-30 02:09 作者: muffler 時間: 2025-3-30 04:51 作者: 使絕緣 時間: 2025-3-30 09:38 作者: Hyperplasia 時間: 2025-3-30 13:45
Pavel Shvaiko,Jér?me Euzenathrnehmen, dann machen Sie bereits in Ihrer Antrittsrede Ihren Mitarbeitern deutlich, wofür Sie stehen und was Ihnen in der Zusammenarbeit wichtig ist. Nutzen Sie die ersten 100 Tage in Ihrer neuen Rolle für eine Bestandsaufnahme, das Netzwerk und den Ausbau des pers?nlichen Kontaktes zu Ihren Mitarb作者: 難管 時間: 2025-3-30 17:57
Maggie Duong,Yanchun Zhanghrnehmen, dann machen Sie bereits in Ihrer Antrittsrede Ihren Mitarbeitern deutlich, wofür Sie stehen und was Ihnen in der Zusammenarbeit wichtig ist. Nutzen Sie die ersten 100 Tage in Ihrer neuen Rolle für eine Bestandsaufnahme, das Netzwerk und den Ausbau des pers?nlichen Kontaktes zu Ihren Mitarb作者: 起波瀾 時間: 2025-3-31 00:47
On the Move to Meaningful Internet Systems: OTM 2008OTM Confederated Int作者: commute 時間: 2025-3-31 04:44
978-3-540-88872-7Springer-Verlag Berlin Heidelberg 2008作者: assail 時間: 2025-3-31 06:02 作者: liposuction 時間: 2025-3-31 09:53 作者: 忘川河 時間: 2025-3-31 17:00
https://doi.org/10.1007/978-3-540-88873-4Design; Suchmaschinen; Text Mining; Web services; Web-based systems; access control; aspect-oriented progr作者: 賭博 時間: 2025-3-31 18:19
Generating a Large Prime Factor of , ,±, ,?+?1 in Polynomial Time.) is the .???. cyclotomic polynomial and .?=?3 or .?=?6. An unconditionally polynomial time algorithm for generating primes of the above form is not yet known. Generating primes of such form is essential for the GH and the CEILIDH Public Key Systems, since they are key parameters in these cryptosystems.作者: amnesia 時間: 2025-3-31 22:11 作者: CONE 時間: 2025-4-1 03:02
Computer Information as the Target and the Means of Commission of Crimes According to Criminal Legislation of the Russian Federationrmation, they do damage to other goods (targets) – electronic payment facilities, property of others, state or bank secret, military objectives, critical infrastructure, as well as the interests of individuals (life and health), personal security, property, intellectual property, etc.).作者: TSH582 時間: 2025-4-1 08:45
Reference work 2023Latest editionerized by a hierarchical structure, meaning that big and active communities control the information exchange within the network. At the same time, the public concern on the vaccination is associated with vaccine complications, parental worries, and uncertainty on the effects on the body.作者: 嗎啡 時間: 2025-4-1 11:10
de immense potentials to revolutionize the fields of plant science and agriculture. Among the genome editing technologies, the CRISPR/Cas systems are the most widely accepted due to its simplicity, robustness and high efficiency. Rice has been increasingly used to test the efficiency of various type作者: 個人長篇演說 時間: 2025-4-1 16:21 作者: 悠然 時間: 2025-4-1 18:58 作者: padding 時間: 2025-4-1 22:46 作者: SMART 時間: 2025-4-2 05:09 作者: Antioxidant 時間: 2025-4-2 08:14