Sciweavers

298 search results - page 44 / 60
» Reconciling role based management and role based access cont...
Sort
View
IWC
2002
98views more  IWC 2002»
13 years 7 months ago
Living memory: agent-based information management for connected local communities
We investigate the application of multi-agent systems to develop intelligent information interfaces for connected communities, a class of computer applications aimed at enhancing ...
Kostas Stathis, Oscar de Bruijn, Silvio Macedo
ICICIC
2006
IEEE
14 years 1 months ago
Fingerprint Identification Based on Frequency Texture Analysis
Nowadays the AFIS (Automatic fingerprint Identification system) plays more and more important roles in various applications such as access control, ATM card verification and crimi...
Juncao Li, Yong Zhang, Wenhai Kong, Xiamu Niu
ETRICS
2006
13 years 11 months ago
A P2P Content Authentication Protocol Based on Byzantine Agreement
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Esther Palomar, Juan M. Estévez-Tapiador, J...
KES
2008
Springer
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
TLT
2008
92views more  TLT 2008»
13 years 6 months ago
Lifelong Learner Modeling for Lifelong Personalized Pervasive Learning
Pervasive and ubiquitous computing has the potential to make huge changes in the ways that we will learn throughout our lives. This paper presents a vision for the lifelong user mo...
Judy Kay