Sciweavers

1352 search results - page 89 / 271
» Designing Security Requirements Models Through Planning
Sort
View
DRM
2006
Springer
14 years 19 days ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...
ICALT
2008
IEEE
14 years 3 months ago
A Mobile Toolkit for Placement Learning
Students whose professional qualifications are gained through work placement-based learning are assessed as to their competency to carryout tasks. These students are usually suppo...
Pei Zhang, David E. Millard, Gary B. Wills, Yvonne...
IHI
2012
266views Healthcare» more  IHI 2012»
12 years 4 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 9 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
EMNLP
2008
13 years 10 months ago
Acquiring Domain-Specific Dialog Information from Task-Oriented Human-Human Interaction through an Unsupervised Learning
We describe an approach for acquiring the domain-specific dialog knowledge required to configure a task-oriented dialog system that uses human-human interaction data. The key aspe...
Ananlada Chotimongkol, Alexander I. Rudnicky