Sciweavers

2847 search results - page 176 / 570
» The Context-Dependent Role Model
Sort
View
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 9 months ago
Using Users' Expectations to Adapt Business Intelligence Systems
: This paper takes a look at the general characteristics of business or economic intelligence system. The role of the user within this type of system is emphasized. We propose two ...
Babajide Afolabi, Odile Thiery
KI
2006
Springer
13 years 9 months ago
Building Robots with Analogy-Based Anticipation
A new approach to building robots with anticipatory behavior is presented. This approach is based on analogy with a single episode from the past experience of the robot. The AMBR m...
Georgi Petkov, Tchavdar Naydenov, Maurice Grinberg...
ML
2006
ACM
110views Machine Learning» more  ML 2006»
13 years 9 months ago
Distribution-based aggregation for relational learning with identifier attributes
Abstract Identifier attributes--very high-dimensional categorical attributes such as particular product ids or people's names--rarely are incorporated in statistical modeling....
Claudia Perlich, Foster J. Provost
ELECTRONICMARKETS
1998
134views more  ELECTRONICMARKETS 1998»
13 years 9 months ago
Agents as Mediators in Electronic Commerce
Software agents help automate a variety of tasks including those involved in buying and selling products over the Internet. This paper surveys several of these agentmediated elect...
Robert H. Guttman, Alexandros Moukas, Pattie Maes
ACSAC
2009
IEEE
14 years 4 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...