Sciweavers

2150 search results - page 138 / 430
» On a restricted cross-intersection problem
Sort
View
SAC
2010
ACM
15 years 11 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
SAC
2010
ACM
15 years 11 months ago
Reachability analysis of GSPDIs: theory, optimization, and implementation
Analysis of systems containing both discrete and continuous dynamics, hybrid systems, is a difficult issue. Most problems have been shown to be undecidable in general, and decidab...
Hallstein Asheim Hansen, Gerardo Schneider
P2P
2009
IEEE
15 years 11 months ago
A Trusted Infrastructure for P2P-based Marketplaces
Peer-to-peer (P2P) based marketplaces have a number of advantages over traditional centralized systems (such as eBay). Peers form a distributed hash table and store sale offers fo...
Tien Tuan Anh Dinh, Tom Chothia, Mark Ryan
DBPL
2009
Springer
131views Database» more  DBPL 2009»
15 years 11 months ago
XML Security Views Revisited
In this paper, we revisit the view based security framework for XML without imposing any of the previously considered restrictions on the class of queries, the class of DTDs, and t...
Benoît Groz, Slawomir Staworko, Anne-C&eacut...
ERCIMDL
2009
Springer
153views Education» more  ERCIMDL 2009»
15 years 11 months ago
SyGAR - A Synthetic Data Generator for Evaluating Name Disambiguation Methods
Name ambiguity in the context of bibliographic citations is one of the hardest problems currently faced by the digital library community. Several methods have been proposed in the ...
Anderson A. Ferreira, Marcos André Gon&cced...