Sciweavers

872 search results - page 92 / 175
» An Access Control Language for a General Provenance Model
Sort
View
WSC
1997
13 years 9 months ago
A Simulation Environment for the Coordinated Operation of Multiple Autonomous Underwater Vehicles
A simulation environment of the coordinated operation of multiple Autonomous Underwater Vehicles (AUVs) is presented. The primary application of this simulation environment is the...
João Borges de Sousa, Aleks Göllü
CIKM
2011
Springer
12 years 7 months ago
Keyword search over RDF graphs
Large knowledge bases consisting of entities and relationships between them have become vital sources of information for many applications. Most of these knowledge bases adopt the...
Shady Elbassuoni, Roi Blanco
SACMAT
2009
ACM
14 years 2 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
DOCENG
2008
ACM
13 years 9 months ago
Enabling adaptive time-based web applications with SMIL state
In this paper we examine adaptive time-based web applications (or presentations). These are interactive presentations where time dictates the major structure, and that require int...
Jack Jansen, Dick C. A. Bulterman
VLDB
2005
ACM
85views Database» more  VLDB 2005»
14 years 1 months ago
A Faceted Query Engine Applied to Archaeology
In this demonstration, we describe a system for storing and querying faceted hierarchies. We have developed a general faceted domain model and a query language for hierarchically ...
Kenneth A. Ross, Angel Janevski, Julia Stoyanovich