Sciweavers

3274 search results - page 118 / 655
» Access Support in Object Bases
Sort
View
146
Voted
CIKM
2005
Springer
15 years 9 months ago
WAM-Miner: in the search of web access motifs from historical web log data
Existing web usage mining techniques focus only on discovering knowledge based on the statistical measures obtained from the static characteristics of web usage data. They do not ...
Qiankun Zhao, Sourav S. Bhowmick, Le Gruenwald
168
Voted
HASE
2008
IEEE
15 years 10 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
150
Voted
CHI
1999
ACM
15 years 8 months ago
TouchCounters: Designing Interactive Electronic Labels for Physical Containers
We present TouchCounters, an integrated system of electronic modules, physical storage containers, and shelving surfaces for the support of collaborative physical work. Through ph...
Paul Yarin, Hiroshi Ishii
131
Voted
SEMWEB
2007
Springer
15 years 9 months ago
Form-Function Reasoning for Product Shape Ontology
We present an ontology of objects, functions, and generic shape representation that supports form-function reasoning. By reasoning from the mechanical and other functions of object...
Eric Wang, Yong Se Kim
146
Voted
TRUSTBUS
2009
Springer
15 years 10 months ago
The OPL Access Control Policy Language
Abstract. Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of dut...
Christopher Alm, Ruben Wolf, Joachim Posegga