Sciweavers

16843 search results - page 39 / 3369
» On Generalized Authorization Problems
Sort
View
IJKL
2006
94views more  IJKL 2006»
13 years 8 months ago
Supporting teachers as content authors in intelligent educational systems
: Intelligent Educational Systems (IESs) need large amounts of educational content that is typically not provided by the creators of these systems. In this paper we discuss a new a...
Peter Brusilovsky, Judith Knapp, Johann Gamper
JCDL
2009
ACM
179views Education» more  JCDL 2009»
14 years 2 months ago
Disambiguating authors in academic publications using random forests
Users of digital libraries usually want to know the exact author or authors of an article. But different authors may share the same names, either as full names or as initials and...
Pucktada Treeratpituk, C. Lee Giles
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
IJCNN
2000
IEEE
14 years 13 days ago
The Cellular Simultaneous Recurrent Network Adaptive Critic Design for the Generalized Maze Problem Has a Simple Closed-Form Sol
The generalized maze problem has been considered as an interesting testbed by various researchers in AI and neural networks. The most significantresults, fiom a neural networks po...
Donald C. Wunsch
CCS
2005
ACM
14 years 1 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha