Sciweavers

3737 search results - page 467 / 748
» Knowledge Management and Promises
Sort
View
IEEEIAS
2007
IEEE
14 years 2 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
ISCAS
2007
IEEE
104views Hardware» more  ISCAS 2007»
14 years 2 months ago
Reduction of Register File Delay Due to Process Variability in VLIW Embedded Processors
Process variation in future technologies can cause severe performance degradation since different parts of the shared Register File (RF) in VLIW processors may operate at various ...
Praveen Raghavan, José L. Ayala, David Atie...
AUSDM
2007
Springer
112views Data Mining» more  AUSDM 2007»
14 years 2 months ago
Measuring Data-Driven Ontology Changes using Text Mining
Most current ontology management systems concentrate on detecting usage-driven changes and representing changes formally in order to maintain the consistency. In this paper, we pr...
Majigsuren Enkhsaikhan, Wilson Wong, Wei Liu, Mark...
CCS
2007
ACM
14 years 2 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CIVR
2007
Springer
128views Image Analysis» more  CIVR 2007»
14 years 2 months ago
An empirical study of inter-concept similarities in multimedia ontologies
Generic concept detection has been a widely studied topic in recent research on multimedia analysis and retrieval, but the issue of how to exploit the structure of a multimedia on...
Markus Koskela, Alan F. Smeaton