Sciweavers

5544 search results - page 42 / 1109
» Three Inadequate Models
Sort
View
CSREASAM
2007
13 years 9 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
SAC
2002
ACM
13 years 7 months ago
An agreement centric access control mechanism for business to business e-commerce
We argue that matrix-based models are inadequate for regulating business to business (or B2B, for short) e-commerce due to the diversity, complexity and potential large number of ...
Victoria Ungureanu
SEMWEB
2005
Springer
14 years 1 months ago
BRAHMS: A WorkBench RDF Store and High Performance Memory System for Semantic Association Discovery
Discovery of semantic associations in Semantic Web ontologies is an important task in various analytical activities. Several query languages and storage systems have been designed ...
Maciej Janik, Krys Kochut
JMM2
2008
122views more  JMM2 2008»
13 years 7 months ago
Applicability of White-Balancing Algorithms to Restoring Faded Colour Slides: An Empirical Evaluation
In this paper we investigated the applicability of commonly used white-balancing algorithms to restoring faded photographic colour slides. We have used three sets of synthetic data...
Dennis Nikitenko, Michael A. Wirth, Kataline Trude...
IRI
2008
IEEE
14 years 2 months ago
Lightweight linked data
Much of the Web’s success rests with its role in enabling information reuse and integration across various boundaries. Hyperlinked Web resources represent a rich information tap...
Erik Wilde, Yiming Liu