Sciweavers

2492 search results - page 72 / 499
» Ontology-based Database Access
Sort
View
CCS
2007
ACM
14 years 4 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ACSAC
2006
IEEE
14 years 4 months ago
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted...
Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl...
ADC
2005
Springer
183views Database» more  ADC 2005»
14 years 4 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
ICDE
1999
IEEE
126views Database» more  ICDE 1999»
14 years 11 months ago
Improving the Access Time Performance of Serpentine Tape Drives
This paper presents a general model for estimating access times of serpentine tape drives. The model is used to schedule I/O requests in order to minimize the total access time. W...
Olav Sandstå, Roger Midtstraum
DEXAW
2005
IEEE
116views Database» more  DEXAW 2005»
14 years 4 months ago
Semantic Maps and Meta-data Enhancing e-Accessibility in Tourism Information Systems
Providing comprehensive accessibility is the major challenge for tourism service providers to address people with disabilities (and older people) as growing consumer groups. Infor...
Hildegard Rumetshofer, Wolfram Wöß