Sciweavers

315 search results - page 8 / 63
» Specifying multimedia access control using RDF
Sort
View
PCM
2004
Springer
101views Multimedia» more  PCM 2004»
14 years 21 days ago
Correlation Filters for Facial Recognition Login Access Control
Abstract. In this paper we utilise the minimum average correlation energy (MACE) and unconstrained minimum average correlation energy (UMACE) filters in conjunction with two corre...
Daniel E. Riedel, Wanquan Liu, Ronny Tjahyadi
VLDB
1993
ACM
112views Database» more  VLDB 1993»
13 years 11 months ago
Specifying and Enforcing Intertask Dependencies
Extensions of the traditional atomic transaction model are needed to support the development of multi-system applications or work ows that access heterogeneous databases and legac...
Paul C. Attie, Munindar P. Singh, Amit P. Sheth, M...
ACSAC
2003
IEEE
14 years 19 days ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
PDPTA
2004
13 years 8 months ago
Achieving Flow Level QoS in Cut-Through Networks Through Admission Control and DiffServ
Cluster networks will serve as the future access networks for multimedia streaming, massive multiplayer online gaming, e-commerce, network storage etc. And for those application ar...
Frank Olaf Sem-Jacobsen, Sven-Arne Reinemo, Tor Sk...
ADC
2007
Springer
150views Database» more  ADC 2007»
14 years 1 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi