Sciweavers

47 search results - page 7 / 10
» Employing Object Technology to Expose Fundamental Object Con...
Sort
View
ASSETS
2000
ACM
14 years 4 days ago
Constructive exploration of spatial information by blind users
When blind people wish to walk through an area not fully known to them, they have to prepare themselves even more thoroughly than sighted pedestrians. We propose a new approach to...
Jochen Schneider, Thomas Strothotte
SUTC
2008
IEEE
14 years 2 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
ACSAC
2008
IEEE
14 years 2 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
ITNG
2006
IEEE
14 years 1 months ago
Utilizing XML Schema for Describing and Querying Still Image Databases
In this paper, still images are modeled by hierarchical tree structures and object relational graphs. These modeling concepts can be described naturally using XML schema. We intro...
Kazem Taghva, Min Xu, Emma Regentova, Tom Nartker
HT
2010
ACM
14 years 25 days ago
iMapping: a zooming user interface approach for personal and semantic knowledge management
We present iMapping, a zooming based approach for visually organizing information objects. It was developed on top of semantic desktop technologies and especially targets the supp...
Heiko Haller, Andreas Abecker