Sciweavers

5252 search results - page 865 / 1051
» Logic in Access Control
Sort
View
AVBPA
2005
Springer
303views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Indexing Biometric Databases Using Pyramid Technique
Abstract. Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. In spite of the rapid proliferation of large-scale dat...
Amit Mhatre, Sharat Chikkerur, Venu Govindaraju
CBSE
2005
Springer
15 years 10 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
CD
2005
Springer
15 years 10 months ago
A Decentralized Redeployment Algorithm for Improving the Availability of Distributed Systems
In distributed and mobile environments, the connections among the hosts on which a software system is running are often unstable. As a result of connectivity losses, the overall a...
Sam Malek, Marija Mikic-Rakic, Nenad Medvidovic
CIKM
2005
Springer
15 years 10 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
DRM
2005
Springer
15 years 10 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison