Sciweavers

2847 search results - page 490 / 570
» The Context-Dependent Role Model
Sort
View
FAC
2010
107views more  FAC 2010»
13 years 7 months ago
Algebra and logic for access control
: © Algebra and logic for access control Matthew Collinson, David Pym HP Laboratories HPL-2008-75R1 Access control, process algebra, bunched Logic; systems modelling The access co...
Matthew Collinson, David J. Pym
IAJIT
2010
157views more  IAJIT 2010»
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
ICRA
2010
IEEE
170views Robotics» more  ICRA 2010»
13 years 7 months ago
Categorizing object-action relations from semantic scene graphs
— In this work we introduce a novel approach for detecting spatiotemporal object-action relations, leading to both, action recognition and object categorization. Semantic scene g...
Eren Erdal Aksoy, Alexey Abramov, Florentin Wö...
KES
2008
Springer
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
ISEM
2010
105views more  ISEM 2010»
13 years 7 months ago
A roadmap to adopting emerging technology in e-business: an empirical study
This study explores the firm’s readiness for developing emerging technology in e−business. By proposing a framework that captures technological, financial, and human capabilit...
Hsin-Lu Chang