Sciweavers

1627 search results - page 129 / 326
» On context in authorization policy
Sort
View
IFIP
2001
Springer
14 years 2 months ago
Systemic Functional Hypertexts (SFHT):
Abstract: On the background of rising Intranet applications the automatic generation of adaptable, context-sensitive hypertexts becomes more and more important [El-Beltagy et al., ...
Alexander Mehler, Rodney J. Clarke
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 3 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
CORR
2002
Springer
105views Education» more  CORR 2002»
13 years 10 months ago
Effectiveness of Preference Elicitation in Combinatorial Auctions
Combinatorial auctions where agents can bid on bundles of items are desirable because they allow the agents to express complementarity and substitutability between the items. Howe...
Benoît Hudson, Tuomas Sandholm
SDMW
2009
Springer
14 years 5 months ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
AINA
2007
IEEE
14 years 4 months ago
A Utility-Based Adaptivity Model for Mobile Applications
Mobile environments are characterized by resource fluctuations and limitations, and variations in user preferences. Therefore mobile applications need to be adaptive to retain us...
Mourad Alia, Viktor S. Wold Eide, Nearchos Paspall...