Sciweavers

33356 search results - page 6591 / 6672
» Models of Continual Computation
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
EDBT
2009
ACM
277views Database» more  EDBT 2009»
14 years 3 months ago
G-hash: towards fast kernel-based similarity search in large graph databases
Structured data including sets, sequences, trees and graphs, pose significant challenges to fundamental aspects of data management such as efficient storage, indexing, and simila...
Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald ...
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
14 years 3 months ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
SAGT
2009
Springer
108views Game Theory» more  SAGT 2009»
14 years 3 months ago
Nash Dynamics in Constant Player and Bounded Jump Congestion Games
We study the convergence time of Nash dynamics in two classes of congestion games – constant player congestion games and bounded jump congestion games. It was shown by Ackermann ...
Tanmoy Chakraborty, Sanjeev Khanna
SEMWEB
2009
Springer
14 years 3 months ago
Semantic Web Service Composition in Social Environments
This paper describes how to generate compositions of semantic Web services using social trust information from user ratings of the services. We present a taxonomy of features, suc...
Ugur Kuter, Jennifer Golbeck
« Prev « First page 6591 / 6672 Last » Next »