Sciweavers

798 search results - page 100 / 160
» Comparing the expressive power of access control models
Sort
View
CCS
2007
ACM
14 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
JMLR
2008
127views more  JMLR 2008»
13 years 9 months ago
Incremental Identification of Qualitative Models of Biological Systems using Inductive Logic Programming
The use of computational models is increasingly expected to play an important role in predicting the behaviour of biological systems. Models are being sought at different scales o...
Ashwin Srinivasan, Ross D. King
PVLDB
2008
77views more  PVLDB 2008»
13 years 8 months ago
Towards a streaming SQL standard
This paper describes a unification of two different SQL extensions for streams and its associated semantics. We use the data models from Oracle and StreamBase as our examples. Ora...
Namit Jain, Shailendra Mishra, Anand Srinivasan, J...
BMCBI
2008
162views more  BMCBI 2008»
13 years 9 months ago
Background correction using dinucleotide affinities improves the performance of GCRMA
Background: High-density short oligonucleotide microarrays are a primary research tool for assessing global gene expression. Background noise on microarrays comprises a significan...
Raad Z. Gharaibeh, Anthony Fodor, Cynthia Gibas
CEC
2009
IEEE
14 years 1 months ago
Memory-enhanced Evolutionary Robotics: The Echo State Network Approach
— Interested in Evolutionary Robotics, this paper focuses on the acquisition and exploitation of memory skills. The targeted task is a well-studied benchmark problem, the Tolman ...
Cédric Hartland, Nicolas Bredeche, Mich&egr...