Sciweavers

736 search results - page 102 / 148
» A Flexible Database Authorization System
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 2 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
SIGMOD
2009
ACM
165views Database» more  SIGMOD 2009»
15 years 9 months ago
Query by output
It has recently been asserted that the usability of a database is as important as its capability. Understanding the database schema, the hidden relationships among attributes in t...
Quoc Trung Tran, Chee-Yong Chan, Srinivasan Partha...
CHI
2008
ACM
16 years 5 months ago
MySong: automatic accompaniment generation for vocal melodies
We introduce MySong, a system that automatically chooses chords to accompany a vocal melody. A user with no musical experience can create a song with instrumental accompaniment ju...
Ian Simon, Dan Morris, Sumit Basu
IUI
2009
ACM
16 years 1 months ago
Data-driven exploration of musical chord sequences
We present data-driven methods for supporting musical creativity by capturing the statistics of a musical database. Specifically, we introduce a system that supports users in expl...
Eric Nichols, Dan Morris, Sumit Basu
126
Voted
SACMAT
2004
ACM
15 years 10 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...