Search results for "ACM"

showing 10 items of 57 documents

Digitization and preservation of cultural heritage: The CEPROQHA approach

2017

The humanity has always learned from the previous experiences for many reasons. The national heritage proves to be a great way to discover a nation's history. As a result, these priceless cultural items have a special attention. However, Since the wide adoption of new digital technologies, documenting, storing, and exhibiting cultural heritage assets became more affordable and reliable. These digital records are then used in several applications. Researchers saw the opportunity to use digital heritage recordings for long-term preservation. In this paper, we present the research progress in cultural heritage digital processing and preservation, highlighting the most impactful advances. Addit…

History[ INFO ] Computer Science [cs]Content management system02 engineering and technologySemanticsDigital records01 natural sciences[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL]World Wide WebACM: H.: Information SystemsCultural diversity3D Modeling0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs][ INFO.INFO-CL ] Computer Science [cs]/Computation and Language [cs.CL]Digital preservationCEPROQHA projectDigitizationComputingMilieux_MISCELLANEOUSDigital heritage010401 analytical chemistryACM : H.: Information Systems020207 software engineering0104 chemical sciencesCultural heritageSemantic enrichmentDigital preservationHumanityCultural heritageDigital heritage
researchProduct

Using Social Networks to Enhance Customer Relationship Management

2013

International audience; In recent years, the Web has evolved into an exchange platform. Customer Relationship Management (CRM) must follow this evolution and connect CRM tools to social networks in order to place companies in the center of all the exchanges. We propose, in this article, a community detection approach that identi fies clusters of customers of a company using their explicit and implicit behaviour. Our contribution is the definition of a composite pro le that integrates various informations gathered from di erent applications, such as the information system of the company, the existing CRM, or Twitter. We de ne a similarity measure, between a user and a tag, that takes into ac…

Knowledge management[INFO.INFO-WB] Computer Science [cs]/WebWeb 2.0Computer science[ INFO.INFO-WB ] Computer Science [cs]/Web02 engineering and technologySimilarity measureCustomer relationship managementSocial Semantic Web020204 information systems0202 electrical engineering electronic engineering information engineeringInformation systemSemantic WebSemantic Webbusiness.industryACM[INFO.INFO-WB]Computer Science [cs]/Web020207 software engineeringSocial CRMSharing and DiscoverySocial Networks and CommunitiesKnowledge ManagementOrder (business)Web 3Web 2business
researchProduct

Mācību vārdnīcas kā skolotāja darba resursi

2016

Bakalaura darbā ar tēmu „Mācību vārdnīca kā skolotāja darba resursi’’, tiek pētītas divas mācību vārdnīcas - Longman Learner’ Dictionary of Contemporary English un Macmillan English Dictionary for Advanced Students. Šī darba mērķis ir pētīt izvēlētās mācību vārdnīcas, kā skolotāja resursus uzdevumu izstrādē četrām valodas prasmēm. Darba procesā izveidojas trīs galvenās nodaļas, un pirmā nodaļa atbild par teorētisko fonu, kurā tiek apkopota informācija par mācīšanas materiāliem, precīzāk, par vārdu krājuma mācīšanas materiāliem un metodēm, tāpat arī tiek analizētas četras valodas prasmes lasīšana, rakstīšana, runāšana un klausīšanās. Šī informācija tiek arī tālāk pielietota praktiskajā daļā.…

Macmillan learner’s dictionaryValodniecībalearner’s dictionariestask designLongman learner’s dictionaryteaching resources
researchProduct

Enforcing mobile security with location-aware role-based access control

2013

This paper describes how location-aware role-based access control RBAC can be implemented on top of the Geospatial eXtensible Access Control Markup Language GeoXACML. It furthermore sketches how spatial separation of duty constraints both static and dynamic can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations, which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC can be used to implement location-dependent access control and also other security enhancing solutions on mobile devices, such as location-dependent device locking, firewall, intrusion prevention or payment…

Markup languageGeospatial analysisComputer Networks and CommunicationsComputer scienceSeparation of dutiesbusiness.industryXACML020206 networking & telecommunicationsAccess control02 engineering and technologyComputer securitycomputer.software_genreFirewall (construction)020204 information systems0202 electrical engineering electronic engineering information engineeringRole-based access controlbusinessMobile devicecomputerInformation Systemscomputer.programming_languageComputer networkSecurity and Communication Networks
researchProduct

A Scratch-based Graphical Policy Editor for XACML

2015

This paper proposes a policy-maker-friendly editor for the extensible Access Control Markup Language (XACML) based on the programming language Scratch. Scratch is a blocks-based programming language designed for teaching children programming, which allows users to build programs like a puzzle. We take this concept one step further with an XACML policy editor based on the graphic programming elements of Scratch implemented in Smalltalk. This allows for aiding the user on how to build policies by grouping blocks and operators that fit together and also indicating which blocks that will stick together. It simplifies building the XACML policies while still having an XACML “feel” of the graphic …

Markup languagebusiness.industrycomputer.internet_protocolComputer scienceProgramming languageAuthorizationXACMLAccess controlcomputer.software_genreScratchbusinesscomputerSmalltalkXMLcomputer.programming_languageProceedings of the 1st International Conference on Information Systems Security and Privacy
researchProduct

Free Minor Closed Classes and the Kuratowski theorem

2009

Free-minor closed classes [2] and free-planar graphs [3] are considered. Versions of Kuratowski-like theorem for free-planar graphs and Kuratowski theorem for planar graphs are considered.

Mathematics::LogicACM Graph Theory: G.2.2FOS: MathematicsMathematics - CombinatoricsMathematics::Metric GeometryMathematics::General TopologyCombinatorics (math.CO)Computer Science::Computational Geometry
researchProduct

Formal Modeling and Discrete-Time Analysis of BPEL Web Services

2008

International audience; Web services are increasingly used for building enterprise information systems according to the Service Oriented Architecture (SOA) paradigm. We propose in this paper a tool-equipped methodology allowing the formal modeling and analysis of Web services described in the BPEL language. The discrete-time transition systems modeling the behavior of BPEL descriptions are obtained by an exhaustive simulation based on a formalization of BPEL semantics using the Algebra of Timed Processes (ATP). These models are then analyzed by model checking value-based temporal logic properties using the CADP toolbox. The approach is illustrated with the design of a Web service for GPS na…

Model checking[ INFO.INFO-MO ] Computer Science [cs]/Modeling and SimulationKnowledge representation and reasoningcomputer.internet_protocolComputer science0211 other engineering and technologies[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][ INFO.INFO-SE ] Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologycomputer.software_genre01 natural sciencesACM : D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methodsFormal specificationACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methodsACM : D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking0202 electrical engineering electronic engineering information engineeringTemporal logicEnterprise information systemFormal verification021103 operations researchDatabase010405 organic chemistrybusiness.industryApplied Mathematics020207 software engineeringService-oriented architectureSystems modeling[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation0104 chemical sciencesComputer Science ApplicationsACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checkingBusiness Process Execution LanguageModeling and Simulation020201 artificial intelligence & image processingWeb serviceSoftware engineeringbusinesscomputer
researchProduct

Two tiered privacy enhanced intrusion detection system architecture

2009

The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.

Network forensicsInformation privacyComputer sciencePrivacy policyLaw enforcementXACMLComputingMilieux_LEGALASPECTSOFCOMPUTINGIntrusion detection systemNetwork monitoringComputer securitycomputer.software_genreHost-based intrusion detection systemcomputercomputer.programming_language2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
researchProduct

Renforcer la mesure sur la qualité de l'éducation

2012

Les réflexions en cours sur le développement et les inégalités accroissent l'intérêt de mesurer les savoirs et les compétences des populations jeunes. Parmi les objectifs du Millénaire pour le développement, la lutte contre l'analphabétisme se fonde sur une éducation de qualité. La question de la création d'outils de mesure de la qualité de l'éducation est donc essentielle pour valider, universellement et équitablement, l'acquisition des apprentissages fondamentaux. Cette question est directement liée au développement, depuis 50 ans, de méthodes d'évaluation des acquisitions à l'origine des grandes enquêtes internationales comme PIRLS, TIMSS et PISA. Dans cet effort de connaissance sur la q…

PIRLSEnquête SSMEEnquête EGRATestComparaison internationaleQualité de l'éducation[SHS.EDU] Humanities and Social Sciences/EducationPISAÉducation comparéeEnquête LLECEEnquête TIMSSEnquête PASECEnquête SACMEQMesurePays en développementEnquête EGMA[SHS.ECO] Humanities and Social Sciences/Economics and Finance
researchProduct

A TR-FRET based functional assay for screening activators of CARM1

2013

Epigenome is an emerging field that demands selective cell-permeable chemical probes to perturb, especially in vivo, the activity of specific enzymes involved in modulating the epigenetic codes. Coactivator Associated Arginine (R) Methyltransferase 1 (CARM1) is a coactivator of estrogen receptor α (ERα), the main target in human breast cancer. We previously showed that overexpression of CARM1 by two-fold in MCF7 breast cancer cells increased the expression of ERα-target genes involved in differentiation and reduced cell proliferation, leading to the hypothesis that activating CARM1 by chemical activators may be therapeutically effective in breast cancer. Selective, potent, cell-permeable CA…

Protein-Arginine N-MethyltransferasesTime FactorsCARM1CARM1; arginine; FRET; methylation; PABP1High-throughput screeningEstrogen receptorarginineBacMamBreast NeoplasmsBiologyBiochemistryArticleEnzyme activatorCoactivatorFluorescence Resonance Energy TransferHumansEpigeneticsPABP1Molecular BiologyOrganic ChemistryFusion proteinEnzyme ActivationCARM1BiochemistryFRETMCF-7 CellsMolecular MedicineFemalemethylation
researchProduct