Sciweavers

1627 search results - page 210 / 326
» On context in authorization policy
Sort
View
ISI
2008
Springer
13 years 10 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
IJAR
2007
104views more  IJAR 2007»
13 years 10 months ago
On representation and aggregation of social evaluations in computational trust and reputation models
Interest for computational trust and reputation models is on the rise. One of the most important aspects of these models is how they deal with information received from other indi...
Jordi Sabater-Mir, Mario Paolucci
SAC
2008
ACM
13 years 9 months ago
Flexible pointer analysis using assign-fetch graphs
se a new abstraction for pointer analysis that represents reads and writes to memory instead of traditional points-to relations. Compared to points-to graphs, our Assign-Fetch Gra...
Marcio Buss, Daniel Brand, Vugranam C. Sreedhar, S...
SAC
2010
ACM
13 years 8 months ago
XTemplate 3.0: adding semantics to hypermedia compositions and providing document structure reuse
Hypermedia composite templates define generic structures of nodes and links that can be reused in different document compositions. The XTemplate language is an XML-based solutio...
Joel André Ferreira dos Santos, Débo...
ICIP
2010
IEEE
13 years 8 months ago
Reducing graphs in graph cut segmentation
In few years, graph cuts have become a leading method for solving a wide range of problems in computer vision. However, graph cuts involve the construction of huge graphs which so...
Nicolas Lerme, François Malgouyres, Lucas L...