Sciweavers

2650 search results - page 389 / 530
» Personalization in E-Commerce Applications
Sort
View
MMMACNS
2001
Springer
14 years 1 months ago
Future Directions in Role-Based Access Control Models
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
Ravi S. Sandhu
ISWC
1998
IEEE
14 years 1 months ago
Parasitic Power Harvesting in Shoes
system to date has served all of the needs of wearable computing--light weight, minimum effort, high power generation, convenient power delivery, and good power regulation. We beli...
John Kymissis, Clyde Kendall, Joseph A. Paradiso, ...
AMOST
2007
ACM
14 years 1 months ago
Using LTL rewriting to improve the performance of model-checker based test-case generation
Model-checkers have recently been suggested for automated software test-case generation. Several works have presented methods that create efficient test-suites using model-checker...
Gordon Fraser, Franz Wotawa
ANCS
2007
ACM
14 years 1 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
14 years 1 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma