Sciweavers

4008 search results - page 732 / 802
» An expressive language of signatures
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 10 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
TLT
2008
149views more  TLT 2008»
13 years 10 months ago
Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning
Abstract-- Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires contin...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...
JOT
2007
99views more  JOT 2007»
13 years 10 months ago
A Framework to Specify Declarative Rules on Objects, Attributes and Associations in the Object Model
There are various mechanisms for creating an application object model. These mechanisms are used for modeling the application Meta model and the user models. Some of the mechanism...
C. Anantaram
JUCS
2007
94views more  JUCS 2007»
13 years 10 months ago
Discovering the Semantics of User Keywords
Abstract: The technology in the field of digital media generates huge amounts of textual information every day, so mechanisms to retrieve relevant information are needed. Under th...
Raquel Trillo, Jorge Gracia, Mauricio Espinoza, Ed...
LOGCOM
2007
91views more  LOGCOM 2007»
13 years 10 months ago
A New Modal Approach to the Logic of Intervals
In Artificial Intelligence there is a need for reasoning about continuous processes, where assertions refer to time intervals rather than time points. Taking our lead from van Ben...
Altaf Hussain