Sciweavers

2654 search results - page 86 / 531
» Accessing the deep web
Sort
View
DLOG
2009
15 years 5 months ago
Using Description Logics in Relation Based Access Control
Relation Based Access Control (RelBAC) is an access control model designed for the new scenarios of access control on Web 2.0. Under this model, we discuss in this paper how to for...
Rui Zhang, Alessandro Artale, Fausto Giunchiglia, ...
162
Voted
KDD
2005
ACM
194views Data Mining» more  KDD 2005»
16 years 4 months ago
Web object indexing using domain knowledge
Web object is defined to represent any meaningful object embedded in web pages (e.g. images, music) or pointed to by hyperlinks (e.g. downloadable files). Users usually search for...
Muyuan Wang, Zhiwei Li, Lie Lu, Wei-Ying Ma, Naiya...
ASSETS
2004
ACM
15 years 10 months ago
Accessibility designer: visualizing usability for the blind
These days, accessibility-related regulations and guidelines have been accelerating the improvement of Web accessibility. One of the accelerating factors is the development and de...
Hironobu Takagi, Chieko Asakawa, Kentarou Fukuda, ...
SACMAT
2011
ACM
14 years 7 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
KDD
2001
ACM
237views Data Mining» more  KDD 2001»
16 years 4 months ago
Exploiting Web Log Mining for Web Cache Enhancement
Abstract. Improving the performance of the Web is a crucial requirement, since its popularity resulted in a large increase in the user perceived latency. In this paper, we describe...
Alexandros Nanopoulos, Dimitrios Katsaros, Yannis ...