Sciweavers

183 search results - page 26 / 37
» Safety analysis of usage control authorization models
Sort
View
HICSS
2002
IEEE
71views Biometrics» more  HICSS 2002»
14 years 1 months ago
Source Code Generator Based on a Proprietary Specification Language
An application generator has resulted from the authors' efforts to improve the development of interactive database applications. The developed tool is based on a meta-base. T...
Kresimir Fertalj, Damir Kalpic, Vedran Mornar
DOCENG
2008
ACM
13 years 10 months ago
Adaptation of scalable multimedia documents
Several scalable media codecs have been standardized in recent years to cope with heterogeneous usage conditions and to aim at always providing audio, video and image content in t...
Benoît Pellan, Cyril Concolato
ACMDIS
2010
ACM
13 years 8 months ago
The CLOTHO project: predicting application utility
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...
INFOCOM
2010
IEEE
13 years 7 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
WWW
2010
ACM
14 years 3 months ago
Exploring web scale language models for search query processing
It has been widely observed that search queries are composed in a very different style from that of the body or the title of a document. Many techniques explicitly accounting for...
Jian Huang 0002, Jianfeng Gao, Jiangbo Miao, Xiaol...