Sciweavers

267 search results - page 37 / 54
» Core Decomposition in Graphs: Concepts, Algorithms and Appli...
Sort
View
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
ENTER
2007
Springer
14 years 15 days ago
Developing a Conversational Travel Advisor with ADVISOR SUITE
Due to the inherent complexity of building highly-interactive and personalized web applications, the development of a web-based travel advisory system can be a costly and timecons...
Dietmar Jannach, Markus Zanker, Markus Jessenitsch...
SRDS
2005
IEEE
14 years 2 months ago
Distributed Construction of a Fault-Tolerant Network from a Tree
We present an algorithm by which nodes arranged in a tree, with each node initially knowing only its parent and children, can construct a fault-tolerant communication structure (a...
Michael K. Reiter, Asad Samar, Chenxi Wang
WWW
2009
ACM
14 years 9 months ago
Relationalizing RDF stores for tools reusability
The emergence of Semantic Web technologies and standards such as Resource Description Framework (RDF) has introduced novel data storage models such as the RDF Graph Model. In this...
Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Ste...
WWW
2008
ACM
14 years 9 months ago
Guanxi in the chinese web - a study of mutual linking
Guanxi is a type of dyadic social interaction based on feelings ("qing") and trust ("xin"). Long studied by scholars of Chinese origin, it has recently drawn t...
Valerie King, Louis Lei Yu, Yan Zhuang