Sciweavers

3303 search results - page 130 / 661
» Multidimensional Access Methods
Sort
View
COMPSAC
2010
IEEE
13 years 7 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
RR
2010
Springer
13 years 7 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
TKDE
1998
139views more  TKDE 1998»
13 years 8 months ago
Distributed Optimistic Concurrency Control Methods for High-Performance Transaction Processing
—There is an ever-increasing demand for more complex transactions and higher throughputs in transaction processing systems leading to higher degrees of transaction concurrency an...
Alexander Thomasian
WEBNET
2000
13 years 10 months ago
Mining the Most Interesting Web Access Associations
: Web access patterns can provide valuable information for website designers in making website-based communication more efficient. To extract interesting or useful web access patte...
Li Shen, Ling Cheng, James Ford, Fillia Makedon, V...
ICIP
2001
IEEE
14 years 10 months ago
Capturing image semantics with low-level descriptors
: We conducted psychophysical experiments to gain insight into the semantic categories that guide the human perception of image similarity. We analyzed the perceptual data using mu...
Aleksandra Mojsilovic, Bernice E. Rogowitz