نتایج جستجو برای: role model
تعداد نتایج: 3176044 فیلتر نتایج به سال:
Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While indivi...
Grounded System Dynamics: A Procedure for Underpinning System Dynamics with a Domain Modeling Method
In this paper, we present a procedure Grounded System Dynamics (GSD) which we use as a guide to underpin a System Dynamics (SD) model with a domain modeling method called Object-Role Modeling (ORM). GSD is a combination of two existing methods (SD with ORM). By combining these two methods we generate synergy effects by using already existing modeling methods and by so doing we overcome some of ...
Subtyping is an important feature of semantic approaches to conceptual schema design and, more recently, object-oriented database design. However the relational model does not directly support subtyping, and CASE tools for mapping conceptual to relational schemas typically provide only very weak support for mapping subtypes. This paper surveys some of the main issues related to conceptual speci...
The behavioral effects of ethanol have been studied in multiple animal models including zebrafish. Locomotion of zebrafish larvae is resistant to high concentrations of ethanol in bath solution. This resistance has been attributed to a lower systemic concentration of ethanol in zebrafish when compared with bath solution, although the mechanism to maintain such a steep gradient is unclear. Here ...
Object-Role Modeling (ORM) is a method for modeling and querying an information system at the conceptual level, and mapping between conceptual and logical (e.g. relational) levels. ORM comes in various flavors, including NIAM (Natural language Information Analysis Method). This article provides an overview of ORM, and notes its advantages over Entity Relationship and traditional Object-Oriented...
Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among agents. While agents cooperate, they interact with each other continuously to access data of other agents and/or to execute other agent’s actions. However, in cases of security-critical ubiquitous services such as med...
Nominal predicates often carry implicit arguments. Recent work on semantic role labeling has focused on identifying arguments within the local context of a predicate; implicit arguments, however, have not been systematically examined. To address this limitation, we have manually annotated a corpus of implicit arguments for ten predicates from NomBank. Through analysis of this corpus, we find th...
The sense of a preposition is related to the semantics of its dominating prepositional phrase. Knowing the sense of a preposition could help to correctly classify the semantic role of the dominating prepositional phrase and vice versa. In this paper, we propose a joint probabilistic model for word sense disambiguation of prepositions and semantic role labeling of prepositional phrases. Our expe...
Modeling security information has always been a fundamental part of every security system. A robust and flexible model is needed in order to guarantee both the easy management of security information and the efficient implementation of security mechanisms. In this paper, we present an XMLbased framework, which can be used for controlling access to computer systems. The framework is mainly targe...
Role Based Access Control (RBAC) has received considerable attention as a model of choice for simplified access control over the past decade. More recently, risk awareness in access control has emerged as an important research theme to mitigate risks involved when users exercise their privileges to access resources under different contexts such as accessing a sensitive file from work versus doi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید