Sciweavers

3303 search results - page 130 / 661
» Multidimensional Access Methods
Sort
View
147
Voted
COMPSAC
2010
IEEE
15 years 5 days ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
RR
2010
Springer
15 years 17 days ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
132
Voted
TKDE
1998
139views more  TKDE 1998»
15 years 1 months ago
Distributed Optimistic Concurrency Control Methods for High-Performance Transaction Processing
—There is an ever-increasing demand for more complex transactions and higher throughputs in transaction processing systems leading to higher degrees of transaction concurrency an...
Alexander Thomasian
WEBNET
2000
15 years 3 months ago
Mining the Most Interesting Web Access Associations
: Web access patterns can provide valuable information for website designers in making website-based communication more efficient. To extract interesting or useful web access patte...
Li Shen, Ling Cheng, James Ford, Fillia Makedon, V...
102
Voted
ICIP
2001
IEEE
16 years 3 months ago
Capturing image semantics with low-level descriptors
: We conducted psychophysical experiments to gain insight into the semantic categories that guide the human perception of image similarity. We analyzed the perceptual data using mu...
Aleksandra Mojsilovic, Bernice E. Rogowitz