Sciweavers

3712 search results - page 633 / 743
» Role-Based Access Control
Sort
View
RAS
2007
109views more  RAS 2007»
13 years 8 months ago
On point-to-point motion planning for underactuated space manipulator systems
In free-floating mode, space manipulator systems have their actuators turned off, and exhibit nonholonomic behavior due to angular momentum conservation. The system is underactua...
Ioannis Tortopidis, Evangelos Papadopoulos
CEC
2010
IEEE
13 years 8 months ago
Mobile interface for adaptive image refinement using interactive evolutionary computing
— Due to developing mobile devices and providing services like mobile blogs, people can easily share their thought and experience, at any place and any time. A picture is an impo...
Tae-min Jung, Youngseol Lee, Sung-Bae Cho
FGCS
2010
99views more  FGCS 2010»
13 years 7 months ago
A conceptual model for attribute aggregation
This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user’s access request based on attributes asserted by multip...
David W. Chadwick, George Inman, Nate Klingenstein
IAJIT
2010
157views more  IAJIT 2010»
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
KES
2008
Springer
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail