Sciweavers

546 search results - page 94 / 110
» ADS as Information Management Service in an M-Learning Envir...
Sort
View
COMAD
2008
13 years 10 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
MM
2010
ACM
215views Multimedia» more  MM 2010»
13 years 9 months ago
Sirio, orione and pan: an integrated web system for ontology-based video search and annotation
In this technical demonstration we show an integrated web system for video search and annotation based on ontologies. The system is composed by three components: the Orione1 ontol...
Marco Bertini, Gianpaolo D'Amico, Andrea Ferracani...
WINET
2010
224views more  WINET 2010»
13 years 7 months ago
Hierarchical geographic multicast routing for wireless sensor networks
Wireless sensor networks comprise typically dense deployments of large networks of small wireless capable sensor devices. In such networks, multicast is a fundamental routing servi...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
SACMAT
2005
ACM
14 years 2 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
WECWIS
2003
IEEE
90views ECommerce» more  WECWIS 2003»
14 years 2 months ago
A Web Agent for Automating E-Commerce Operations
The great amount of information that a user handles in their typical transactions on the Internet –identifiers, addresses, credit card numbers, among others-, makes it necessary...
Juan Raposo, Manuel Álvarez, Ángel V...