Sciweavers

366 search results - page 10 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
OIR
2010
101views more  OIR 2010»
13 years 6 months ago
Supporting information access in e-learning by integrating digital libraries and ontology
Purpose – The purpose of this paper is to examine the integration of digital library (DL) technologies with ontology-based knowledge representation in providing semantic rich in...
Daqing He, Yefei Peng, Ming Mao, Dan Wu
TASE
2007
IEEE
14 years 1 months ago
Design of a Certifying Compiler Supporting Proof of Program Safety
Safety is an important property of high-assurance software, and one of the hot research topics on it is the verification method for software to meet its safety policies. In our p...
Yiyun Chen, Lin Ge, Baojian Hua, Zhaopeng Li, Chen...
JSS
2006
122views more  JSS 2006»
13 years 7 months ago
Efficient index caching for data dissemination in mobile computing environments
Due to the limited power supply of mobile devices, much research has been done on reducing the power consumption of mobile devices in mobile computing environments. Since supporti...
Jen-Jou Hung, Yungho Leu
DEXAW
2000
IEEE
134views Database» more  DEXAW 2000»
13 years 12 months ago
A Comparative Study of Selected Parallel Video Servers
This paper compares different selected and representative parallel video servers, including our server SESAMEKB, by the means of their architectural design, striping, scheduling, ...
Klaus Breidler, Harald Kosch, László...
FLOPS
2006
Springer
13 years 11 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov