Sciweavers

1927 search results - page 164 / 386
» Modeling the Evolution of Objects in Temporal Information Sy...
Sort
View
IRI
2005
IEEE
14 years 2 months ago
Towards administration of a hybrid role hierarchy
Role-Based Access Control (RBAC) models have emerged as a leading access control approach for today’s information systems. Hybrid role hierarchies introduced in the Generalized ...
Suroop Mohan Chandran, James B. D. Joshi
SIGOPS
2010
163views more  SIGOPS 2010»
13 years 4 months ago
Automated control of internet services
Finding an efficient configuration for cluster-based multi-tier Internet services is often a difficult task. Moreover, even a good configuration could become obsolete, depending o...
Jean Arnaud
ICCV
2003
IEEE
14 years 11 months ago
Using Specularities for Recognition
Recognition systems have generally treated specular highlights as noise. We show how to use these highlights as a positive source of information that improves recognition of shiny...
Margarita Osadchy, David W. Jacobs, Ravi Ramamoort...
CSCW
1996
ACM
14 years 1 months ago
Freeflow: Mediating Between Representation and Action in Workflow Systems
In order to understand some problems associated with workflow, we set out an analysis of workflow systems, identifying a number of basic issues in the underlying technology. This ...
Paul Dourish, Jim Holmes, Allan MacLean, Pernille ...
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
14 years 9 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider