Sciweavers

807 search results - page 91 / 162
» Term Rewriting for Access Control
Sort
View
145
Voted
ETRICS
2006
15 years 7 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
124
Voted
PST
2004
15 years 4 months ago
Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation
The paper reports on ongoing research into the development of a management system to co-ordinate a set of activities of a virtual organisation for the production of chemicals. The...
Panayiotis Periorellis, Christopher J. W. Townson,...
99
Voted
ASSETS
2008
ACM
15 years 4 months ago
Analysis of speech properties of neurotypicals and individuals diagnosed with autism and down
Many individuals diagnosed with autism and Down syndrome have difficulties producing intelligible speech. Systematic analysis of their voice parameters could lead to better unders...
Mohammed E. Hoque
100
Voted
ERCIMDL
2010
Springer
151views Education» more  ERCIMDL 2010»
15 years 4 months ago
DiLiA - The Digital Library Assistant
In this paper we present the digital library assistant (DiLiA). The system aims at augmenting the search in digital libraries in several dimensions. In the project advanced informa...
Kathrin Eichler, Holmer Hemsen, Günter Neuman...
GIS
2008
ACM
15 years 4 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray