Sciweavers

5544 search results - page 189 / 1109
» Three Inadequate Models
Sort
View
GG
2004
Springer
14 years 2 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
IBPRIA
2003
Springer
14 years 2 months ago
Comparison of Log-linear Models and Weighted Dissimilarity Measures
Abstract. We compare two successful discriminative classification algorithms on three databases from the UCI and STATLOG repositories. The two approaches are the log-linear model ...
Daniel Keysers, Roberto Paredes, Enrique Vidal, He...
HICSS
1999
IEEE
72views Biometrics» more  HICSS 1999»
14 years 1 months ago
Creation of Professional Networks: An Emergent Model using Telemedicine as a Case
Information technologies enhance efficiency oriented organizational networks and enable creation of expertise oriented professional networks. However, whether IT-enabled efficienc...
H. Õseyin Tanriverdi, N. Venkatraman
ERCIMDL
2006
Springer
110views Education» more  ERCIMDL 2006»
14 years 28 days ago
Beyond Digital Incunabula: Modeling the Next Generation of Digital Libraries
This paper describes several incunabular assumptions that impose upon early digital libraries the limitations drawn from print, and argues for a design strategy aimed at providing ...
Gregory Crane, David Bamman, Lisa Cerrato, Alison ...
ATAL
2003
Springer
14 years 27 days ago
Posit spaces: a performative model of e-commerce
What distinguishes e-commerce from ordinary commerce? What distinguishes it from distributed computation? In this paper we propose a performative theory of e-commerce, drawing on ...
Peter McBurney, Simon Parsons