Sciweavers

497 search results - page 84 / 100
» A knowledgeable security model for distributed health inform...
Sort
View
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
14 years 2 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
RSA
2000
170views more  RSA 2000»
13 years 8 months ago
Delayed path coupling and generating random permutations
We analyze various stochastic processes for generating permutations almost uniformly at random in distributed and parallel systems. All our protocols are simple, elegant and are b...
Artur Czumaj, Miroslaw Kutylowski
CCS
2007
ACM
14 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
IADIS
2003
13 years 10 months ago
Forecasting the Growth of ATM and POS in the Portuguese Banking System
There are several factors that have been influencing and creating deep changes in the Portuguese banking sector. Among these, we can highlight technological innovation, the increa...
Fernando Alberto Freitas Ferreira, Nuno Sidó...
KDD
2009
ACM
230views Data Mining» more  KDD 2009»
14 years 9 months ago
Analyzing patterns of user content generation in online social networks
Various online social networks (OSNs) have been developed rapidly on the Internet. Researchers have analyzed different properties of such OSNs, mainly focusing on the formation an...
Lei Guo, Enhua Tan, Songqing Chen, Xiaodong Zhang,...