Sciweavers

1039 search results - page 191 / 208
» Query reformulation with constraints
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 22 days ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
DASFAA
1997
IEEE
112views Database» more  DASFAA 1997»
14 years 20 days ago
Client-Server Optimization for Multimedia Document Exchange
The success of the World Wide Web is boosting the development of multimedia database systems and their integration into the internet. For the documents stored and exchanged in the...
Gerhard Köstler, Wolfgang L. J. Kowarschick, ...
ICDT
1990
ACM
110views Database» more  ICDT 1990»
14 years 15 days ago
Beginnings of a Theory of General Database Completions
Ordinary logical implication is not enough for answering queries in a logic database, since especially negative information is only implicitly represented in the database state. M...
Stefan Brass
DMSN
2007
ACM
14 years 12 days ago
A graph-based approach to vehicle tracking in traffic camera video streams
Vehicle tracking has a wide variety of applications, from law enforcement to traffic planning and public safety. However, the image resolution of the videos available from most tr...
Hamid Haidarian Shahri, Galileo Namata, Saket Navl...
APNOMS
2006
Springer
14 years 6 days ago
Information-Driven Task Routing for Network Management in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of a large collection of small nodes providing collaborative and distributed sensing ability in unpredictable environments. Given their unat...
Yu Liu, Yumei Wang, Lin Zhang, Chan-Hyun Youn