نتایج جستجو برای: role model

تعداد نتایج: 3176044  

2008
Minsoo Kim James B. D. Joshi Minkoo Kim

Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While indivi...

2011
P. Tulinayo Patrick van Bommel Henderik Alex Proper

In this paper, we present a procedure Grounded System Dynamics (GSD) which we use as a guide to underpin a System Dynamics (SD) model with a domain modeling method called Object-Role Modeling (ORM). GSD is a combination of two existing methods (SD with ORM). By combining these two methods we generate synergy effects by using already existing modeling methods and by so doing we overcome some of ...

1995
Terry Halpin DipEd BSc

Subtyping is an important feature of semantic approaches to conceptual schema design and, more recently, object-oriented database design. However the relational model does not directly support subtyping, and CASE tools for mapping conceptual to relational schemas typically provide only very weak support for mapping subtypes. This paper surveys some of the main issues related to conceptual speci...

2013
Hiromi Ikeda Alison H. Delargy Tohei Yokogawa Jason M. Urban Harold A. Burgess Fumihito Ono

The behavioral effects of ethanol have been studied in multiple animal models including zebrafish. Locomotion of zebrafish larvae is resistant to high concentrations of ethanol in bath solution. This resistance has been attributed to a lower systemic concentration of ethanol in zebrafish when compared with bath solution, although the mechanism to maintain such a steep gradient is unclear. Here ...

2004

Object-Role Modeling (ORM) is a method for modeling and querying an information system at the conceptual level, and mapping between conceptual and logical (e.g. relational) levels. ORM comes in various flavors, including NIAM (Natural language Information Analysis Method). This article provides an overview of ORM, and notes its advantages over Entity Relationship and traditional Object-Oriented...

2008
Youna Jung Amirreza Masoumzadeh James B. D. Joshi Minkoo Kim

Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among agents. While agents cooperate, they interact with each other continuously to access data of other agents and/or to execute other agent’s actions. However, in cases of security-critical ubiquitous services such as med...

Journal: :Computational Linguistics 2012
Matthew Gerber Joyce Yue Chai

Nominal predicates often carry implicit arguments. Recent work on semantic role labeling has focused on identifying arguments within the local context of a predicate; implicit arguments, however, have not been systematically examined. To address this limitation, we have manually annotated a corpus of implicit arguments for ten predicates from NomBank. Through analysis of this corpus, we find th...

2009
Daniel Dahlmeier Hwee Tou Ng Tanja Schultz

The sense of a preposition is related to the semantics of its dominating prepositional phrase. Knowing the sense of a preposition could help to correctly classify the semantic role of the dominating prepositional phrase and vice versa. In this paper, we propose a joint probabilistic model for word sense disambiguation of prepositions and semantic role labeling of prepositional phrases. Our expe...

2004
Ioannis Priggouris Stathes Hadjiefthymiades Lazaros F. Merakos

Modeling security information has always been a fundamental part of every security system. A robust and flexible model is needed in order to guarantee both the easy management of security information and the efficient implementation of security mechanisms. In this paper, we present an XMLbased framework, which can be used for controlling access to computer systems. The framework is mainly targe...

2012
Khalid Zaman Bijon Ram Krishnan Ravi S. Sandhu

Role Based Access Control (RBAC) has received considerable attention as a model of choice for simplified access control over the past decade. More recently, risk awareness in access control has emerged as an important research theme to mitigate risks involved when users exercise their privileges to access resources under different contexts such as accessing a sensitive file from work versus doi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید