Sciweavers

1615 search results - page 320 / 323
» Distributed Forward Checking
Sort
View
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ODRL
2004
13 years 9 months ago
Interoperability between ODRL and MPEG-21 REL
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...
Josep Polo, Jose Prados, Jaime Delgado
DOCENG
2010
ACM
13 years 8 months ago
FormCracker: interactive web-based form filling
Filling out document forms distributed by email or hosted on the Web is still problematic and usually requires a printer and scanner. Users commonly download and print forms, fill...
Laurent Denoue, John Adcock, Scott Carter, Patrick...
BIODATAMINING
2008
117views more  BIODATAMINING 2008»
13 years 7 months ago
Search extension transforms Wiki into a relational system: A case for flavonoid metabolite database
Background: In computer science, database systems are based on the relational model founded by Edgar Codd in 1970. On the other hand, in the area of biology the word 'databas...
Masanori Arita, Kazuhiro Suwa
SIAMCO
2008
103views more  SIAMCO 2008»
13 years 7 months ago
Perturbation Methods in Stability and Norm Analysis of Spatially Periodic Systems
We consider systems governed by partial differential equations with spatially periodic coefficients over unbounded domains. These spatially periodic systems are considered as pertu...
Makan Fardad, Bassam Bamieh