Sciweavers

2270 search results - page 173 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
PODS
2009
ACM
130views Database» more  PODS 2009»
16 years 4 months ago
The finite model theory toolbox of a database theoretician
For many years, finite model theory was viewed as the backbone of database theory, and database theory in turn supplied finite model theory with key motivations and problems. By n...
Leonid Libkin
103
Voted
HICSS
2005
IEEE
175views Biometrics» more  HICSS 2005»
15 years 9 months ago
Creating Value from Digital Content: eBusiness Model Evolution in Online News and Music
The past two years have been a turbulent time for the New Economy generally – and for the digital content industry in particular. In the wake of the dot.com and telecoms crashes...
Kornelia van der Beek, Paula M. C. Swatman, Cornel...
124
Voted
FGR
2008
IEEE
156views Biometrics» more  FGR 2008»
15 years 5 months ago
Modelling human perception of static facial expressions
Data collected through a recent web-based survey show that the perception (i.e. labeling) of a human facial expression by a human observer is a subjective process, which results i...
Matteo Sorci, Jean-Philippe Thiran, J. Cruz, T. Ro...
122
Voted
DBSEC
2003
155views Database» more  DBSEC 2003»
15 years 5 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
124
Voted
KYOTODL
2000
87views more  KYOTODL 2000»
15 years 5 months ago
Modeling Customizable Web Applications
The web is more and more used as a platform for fullfledged, increasingly complex applications, where a huge amount of change-intensive data is managed by underlying database syst...
Gerti Kappel, Werner Retschitzegger, Wieland Schwi...