Search results for "Information Systems."

showing 10 items of 1545 documents

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct

Terrorism communication : characteristics and emerging perspectives in the scientific literature 2002–2011

2013

This paper aims to clarify current knowledge on the contribution of communication to crisis management in the case of terrorism incidents. This is done by means of a systematic review of the scientific literature on terrorism communication over the last 10 years to identify the many challenges facing communication in such crises, and represents the first attempt of its kind. To date, within the literature on terrorism communication, much attention has been paid to chemical, biological, radiological or nuclear hazards. Terrorism crises are complex and challenging. Preparedness for such diverse low-probability high-impact crises can best be included in a wider educative approach. Terrorism cr…

021110 strategic defence & security studiesManagement sciencebusiness.industry05 social sciences0211 other engineering and technologieskriiisiviestintä050801 communication & media studies02 engineering and technologyScientific literatureCrisis managementterrorismManagement Monitoring Policy and LawPublic relations16. Peace & justicekriisiviestintäManagement Information Systems0508 media and communicationsterrorismiPreparednessPolitical scienceTerrorismbusinesscrisis communication
researchProduct

Las normas ISO/IEC como mecanismos de responsabilidad proactiva en el Reglamento General de Protección de Datos

2021

El mercado de la certificación ha experimentado un auge sin precedentes tras la entrada en vigor y ulterior aplicación del RGPD. Ello obliga a poner de relieve la relevancia de estos mecanismos como elementos claves en la prevención de potenciales violaciones de la seguridad de los datos personales. En el presente trabajo examinamos cómo la naturaleza técnica de estos instrumentos ha cedido hacia su corregulación a los efectos de garantizar una adaptación efi ciente a los continuos cambios de una gran tipología de productos, servicios o sistemas. Pretende proporcionarse una panorámica holística sobre la práctica totalidad de estándares que afectan a las dimensiones de privacidad y protecció…

021110 strategic defence & security studiesSociology and Political Science0211 other engineering and technologiescertification mechanismsISO/IEC 27701RGPDK1-772002 engineering and technologyISO/IEC 27001Political science (General)Law in general. Comparative and uniform law. Jurisprudence020204 information systemsmecanismos de certificación0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)responsabilidad proactivaJA1-92Lawproactive responsibilityIDP. Revista de Internet Derecho y Política
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

Revealing community structures by ensemble clustering using group diffusion

2018

We propose an ensemble clustering approach using group diffusion to reveal community structures in data. We represent data points as a directed graph and assume each data point belong to single cluster membership instead of multiple memberships. The method is based on the concept of ensemble group diffusion with a parameter to represent diffusion depth in clustering. The ability to modulate the diffusion-depth parameter by varying it within a certain interval allows for more accurate construction of clusters. Depending on the value of the diffusion-depth parameter, the presented approach can determine very well both local clusters and global structure of data. At the same time, the ability …

0301 basic medicineComputer scienceProperty (programming)Markov chain02 engineering and technologyInterval (mathematics)03 medical and health sciencesdiffuusio (fysikaaliset ilmiöt)0202 electrical engineering electronic engineering information engineeringCluster (physics)SegmentationDiffusion (business)Cluster analysista113ta213diffusionDirected graph030104 developmental biologyData pointHardware and ArchitectureSignal Processingyhdyskuntarakenne020201 artificial intelligence & image processingsocial networkcommunity structureAlgorithmSoftwareInformation Systemsclustering
researchProduct

A framework for data-driven adaptive GUI generation based on DICOM

2018

Computer applications for diagnostic medical imaging provide generally a wide range of tools to support physicians in their daily diagnosis activities. Unfortunately, some functionalities are specialized for specific diseases or imaging modalities, while other ones are useless for the images under investigation. Nevertheless, the corresponding Graphical User Interface (GUI) widgets are still present on the screen reducing the image visualization area. As a consequence, the physician may be affected by cognitive overload and visual stress causing a degradation of performances, mainly due to unuseful widgets. In clinical environments, a GUI must represent a sequence of steps for image investi…

0301 basic medicineDiagnostic ImagingAutomatedComputer scienceData-driven GUI generation; DICOM; Faceted classification; Graphical user interfaces; Medical diagnostic software; Algorithms; Brain; Cognition; Computers; Decision Support Systems Clinical; Diagnostic Imaging; Feasibility Studies; Humans; Magnetic Resonance Imaging; Medical Informatics; Pattern Recognition Automated; Software; Computer Graphics; Radiology Information Systems; User-Computer InterfaceGraphical user interfacesDecision Support SystemsHealth InformaticsPattern Recognitioncomputer.software_genrePattern Recognition Automated030218 nuclear medicine & medical imaging03 medical and health sciencesDICOMClinicalUser-Computer Interface0302 clinical medicineSoftwareCognitionHuman–computer interactionComputer GraphicsHumansDICOMGraphical user interfaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFaceted classificationbusiness.industryComputersData-driven GUI generationBrainComputer Science Applications1707 Computer Vision and Pattern RecognitionMedical diagnostic softwareDecision Support Systems ClinicalMagnetic Resonance ImagingComputer Science ApplicationsVisualizationSoftware frameworkGraphical user interface030104 developmental biologyWorkflowRadiology Information SystemsInformation modelSoftware designFeasibility StudiesbusinesscomputerAlgorithmsMedical InformaticsSoftware
researchProduct

Predictive shelf life model based on RF technology for improving the management of food supply chain: A case study

2016

The aim of this paper was the development of a Smart Logistic Unit (SLU) based on RF technology to support the management of the food supply chain, in order to guarantee the shelf life of products in agreement with logistic efficiency and system sustainability. For this purpose, the main parameters that influence the quality of perishable products were determined and a shelf life equation based on Volatile Organic Compounds (VOCs) was modelled. The levels of VOCs were gathered by the sensors allocated inside the SLU, which configures as the remote element of a system for identification and data transmission. The proposed model was then validated through an experimental test, simulating the …

0301 basic medicineEngineeringmedia_common.quotation_subject030106 microbiologyRF technologyShelf lifeIndustrial and Manufacturing EngineeringManagement Information Systems03 medical and health sciencesRf technologyManagement of Technology and InnovationFood supplySettore ING-IND/17 - Impianti Industriali Meccanici0502 economics and businessQuality (business)Electrical and Electronic Engineeringmedia_commonbusiness.industry05 social sciencesReliability engineeringIdentification (information)SustainabilitySystems engineeringbusiness050203 business & managementSettore AGR/16 - Microbiologia AgrariaData transmissionInternational Journal of RF Technologies
researchProduct

Alignment-free sequence comparison using absent words

2018

Sequence comparison is a prerequisite to virtually all comparative genomic analyses. It is often realised by sequence alignment techniques, which are computationally expensive. This has led to increased research into alignment-free techniques, which are based on measures referring to the composition of sequences in terms of their constituent patterns. These measures, such as $q$-gram distance, are usually computed in time linear with respect to the length of the sequences. In this paper, we focus on the complementary idea: how two sequences can be efficiently compared based on information that does not occur in the sequences. A word is an {\em absent word} of some sequence if it does not oc…

0301 basic medicineFOS: Computer and information sciencesFormal Languages and Automata Theory (cs.FL)Computer Science - Formal Languages and Automata TheorySequence alignmentInformation System0102 computer and information sciencesCircular wordAbsent words01 natural sciencesUpper and lower boundsSequence comparisonTheoretical Computer ScienceCombinatorics03 medical and health sciencesComputer Science - Data Structures and AlgorithmsData Structures and Algorithms (cs.DS)Absent wordCircular wordsMathematicsSequenceSettore INF/01 - InformaticaProcess (computing)q-gramComputer Science Applications1707 Computer Vision and Pattern Recognitionq-gramsComposition (combinatorics)Computer Science Applications030104 developmental biologyComputational Theory and MathematicsForbidden words010201 computation theory & mathematicsFocus (optics)Forbidden wordWord (computer architecture)Information SystemsInteger (computer science)
researchProduct

Feasibility of sample size calculation for RNA-seq studies

2017

Sample size calculation is a crucial step in study design but is not yet fully established for RNA sequencing (RNA-seq) analyses. To evaluate feasibility and provide guidance, we evaluated RNA-seq sample size tools identified from a systematic search. The focus was on whether real pilot data would be needed for reliable results and on identifying tools that would perform well in scenarios with different levels of biological heterogeneity and fold changes (FCs) between conditions. We used simulations based on real data for tool evaluation. In all settings, the six evaluated tools provided widely different answers, which were strongly affected by FC. Although all tools failed for small FCs, s…

0301 basic medicineFold (higher-order function)Sequence Analysis RNAComputer scienceHigh-Throughput Nucleotide SequencingRNA-Seqcomputer.software_genre03 medical and health sciences030104 developmental biology0302 clinical medicineResearch DesignSample size determinationSample SizeFeasibility StudiesHumansData miningMolecular BiologycomputerSoftware030217 neurology & neurosurgeryInformation SystemsSystematic searchBriefings in Bioinformatics
researchProduct

Assessing data analysis performance in research contexts: An experiment on accuracy, efficiency, productivity and researchers’ satisfaction

2018

[EN] Any knowledge generation process involves raw data comprehension, evaluation and inferential reasoning. These practices, common to different disciplines, are known as data analysis, and represent the most important set of activities in research contexts. Researchers use data analysis software methods and tools for generating new knowledge in their daily data analysis. In recent years, data analysis software has been incorporating explicit references in modelling of cognitive processes, in order to improve the assistance offered in data analysis tasks. However, data analysis software commercial suites are still resisting this inclusion, and there is little empirical work done in knowing…

0301 basic medicineInformation Systems and ManagementKnowledge managementbusiness.industryComputer science020207 software engineering02 engineering and technologyCognitive processesSoftware-assistance03 medical and health sciences030104 developmental biology0202 electrical engineering electronic engineering information engineeringChristian ministryData-analysis performancebusinessLENGUAJES Y SISTEMAS INFORMATICOSProductivityData-analysisData-analysis measurementData & Knowledge Engineering
researchProduct