Sciweavers

1818 search results - page 129 / 364
» How users use access control
Sort
View
W4A
2005
ACM
14 years 2 months ago
What's the web like if you can't see it?
Awareness of Web accessibility is spreading all over the world among Web designers and developers, due to regulations such as the US law called Section 508 and guidelines like the...
Chieko Asakawa
CCGRID
2008
IEEE
14 years 3 months ago
Admission Control in a Computational Market
We propose, implement and evaluate three admission models for computational Grids. The models take the expected demand into account and offer a specific performance guarantee. Th...
Thomas Sandholm, Kevin Lai, Scott H. Clearwater
SIGMOD
2004
ACM
88views Database» more  SIGMOD 2004»
14 years 9 months ago
Using Reasoning to Guide Annotation with Gene Ontology Terms in GOAT
High-quality annotation of biological data is central to bioinformatics. Annotation using terms from ontologies provides reliable computational access to data. The Gene Ontology (...
Michael Bada, Daniele Turi, Robin McEntire, Robert...
CCS
2007
ACM
14 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
GRAPHICSINTERFACE
1996
13 years 10 months ago
Topological Evolution of Surfaces
This paper presents a framework for generating smoothlooking transformations between pairs of surfaces that may differ in topology. The user controls the transformation by specify...
Douglas DeCarlo, Jean H. Gallier