Sciweavers

1627 search results - page 161 / 326
» On context in authorization policy
Sort
View
SEMWEB
2007
Springer
14 years 4 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
IJCNN
2006
IEEE
14 years 4 months ago
Reinforcement Learning for Parameterized Motor Primitives
Abstract— One of the major challenges in both action generation for robotics and in the understanding of human motor control is to learn the “building blocks of movement genera...
Jan Peters, Stefan Schaal
NSPW
2006
ACM
14 years 4 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
SASN
2006
ACM
14 years 4 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
JCDL
2003
ACM
114views Education» more  JCDL 2003»
14 years 3 months ago
Understanding Educator Perceptions of "Quality" in Digital Libraries
The purpose of the study was to identify educators’ expectations and requirements for the design of educational digital collections for classroom use. A series of five focus gro...
Tamara Sumner, Michael Khoo, Mimi Recker, Mary Mar...