Sciweavers

2477 search results - page 37 / 496
» Object list controlled process data system
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 7 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
ICIP
2003
IEEE
14 years 9 months ago
Top-down control of visual attention in object detection
Current computational models of visual attention focus on bottom-up information and ignore scene context. However, studies in visual cognition show that humans use context to faci...
Aude Oliva, Antonio B. Torralba, Monica S. Castelh...
DAWAK
2003
Springer
14 years 28 days ago
Performance Tests in Data Warehousing ETLM Process for Detection of Changes in Data Origin
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...
RECSYS
2009
ACM
14 years 2 months ago
FriendSensing: recommending friends using mobile phones
We propose FriendSensing, a framework that automatically suggests friends to mobile social-networking users. Using short-range technologies (e.g., Bluetooth) on her mobile phone, ...
Daniele Quercia, Licia Capra
SPAA
2010
ACM
13 years 8 months ago
A universal construction for wait-free transaction friendly data structures
Given the sequential implementation of any data structure, we show how to obtain an efficient, wait-free implementation of that data structure shared by any fixed number of proces...
Phong Chuong, Faith Ellen, Vijaya Ramachandran