Sciweavers

1459 search results - page 104 / 292
» An authorization model for temporal data
Sort
View
CIKM
2008
Springer
15 years 6 months ago
Scalable community discovery on textual data with relations
Every piece of textual data is generated as a method to convey its authors' opinion regarding specific topics. Authors deliberately organize their writings and create links, ...
Huajing Li, Zaiqing Nie, Wang-Chien Lee, C. Lee Gi...
LCN
2006
IEEE
15 years 10 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
EUROCRYPT
2011
Springer
14 years 8 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
CORR
2006
Springer
99views Education» more  CORR 2006»
15 years 4 months ago
Statistical mechanics of neocortical interactions: Portfolio of Physiological Indicators
There are several kinds of non-invasive imaging methods that are used to collect data from the brain, e.g., EEG, MEG, PET, SPECT, fMRI, etc. It is difficult to get resolution of i...
Lester Ingber
KI
2002
Springer
15 years 4 months ago
Empirically Grounded Decision-Theoretic Adaptation to Situation-Dependent Resource Limitations
This article summarizes research on several interrelated general issues that can arise in the design and development of user modeling systems: the learning and subsequent adaptati...
Thorsten Bohnenberger, Boris Brandherm, Barbara Gr...