Sciweavers

128 search results - page 12 / 26
» Role Based Access Control for the Interaction with Search En...
Sort
View
TREC
2003
13 years 9 months ago
Knowledge-Based Access to the Bio-Medical Literature, Ontologically-Grounded Experiments for the TREC 2003 Genomics Track
The Tarragon Consulting team participated in the primary task of the TREC 2003 Genomics Track. We used a combination of knowledge-engineering and corpus analysis to construct sema...
Richard Tong, John Quackenbush, Mark Snuffin
UIST
2009
ACM
14 years 2 months ago
Overview based example selection in end user interactive concept learning
Interaction with large unstructured datasets is difficult because existing approaches, such as keyword search, are not always suited to describing concepts corresponding to the di...
Saleema Amershi, James Fogarty, Ashish Kapoor, Des...
SACMAT
2009
ACM
14 years 2 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
AVI
2008
13 years 9 months ago
Agent warp engine: formula based shape warping for networked applications
Computer visualization and networking have advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached...
Alexander Repenning, Andri Ioannidou
ACSAC
2009
IEEE
14 years 2 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...