Sciweavers

2212 search results - page 306 / 443
» Approaches to Hospital Process Management
Sort
View
IANDO
2010
112views more  IANDO 2010»
14 years 11 months ago
Generative mechanisms for innovation in information infrastructures
This paper investigates how innovation of ICT based services takes place within existing infrastructures, including the whole network of technology, vendors and customers. Our res...
Bendik Bygstad
EUROSYS
2006
ACM
15 years 10 months ago
K42: building a complete operating system
K42 is one of the few recent research projects that is examining operating system design structure issues in the context of new whole-system design. K42 is open source and was des...
Orran Krieger, Marc A. Auslander, Bryan S. Rosenbu...
SACMAT
2010
ACM
15 years 9 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SACMAT
2010
ACM
15 years 9 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
150
Voted
WWW
2008
ACM
16 years 5 months ago
Supporting anonymous location queries in mobile environments with privacygrid
This paper presents PrivacyGrid - a framework for supporting anonymous location-based queries in mobile information delivery systems. The PrivacyGrid framework offers three unique...
Bhuvan Bamba, Ling Liu, Péter Pesti, Ting W...