Sciweavers

1147 search results - page 25 / 230
» Transformation of Access Rights
Sort
View
COMCOM
2004
98views more  COMCOM 2004»
13 years 8 months ago
Performance evaluation of a broadband wireless access system subjected to heavy load
Broadband Wireless Access (BWA) systems use new network architectures to deliver broadband services in a fixed point-to-point or pointto-multipoint configuration to residential an...
Alejandro Quintero, Yacine Elalamy, Samuel Pierre
INFORMATICALT
2002
72views more  INFORMATICALT 2002»
13 years 8 months ago
Simulation of Conflict in an Agent World: Access to Resources and Possibility of Termination of the Population
The goal of the paper is to create a model for investigating the character of relationships between the freedom and restrictions in the terrorism context, in order to find out how ...
Jaak Tepandi
DEXAW
1998
IEEE
94views Database» more  DEXAW 1998»
14 years 27 days ago
Towards Access Control for Logical Document Structures
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Fredj Dridi, Gustaf Neumann
DATASCIENCE
2006
105views more  DATASCIENCE 2006»
13 years 8 months ago
Data publication in the open access initiative
The `Berlin Declaration' was published in 2003 as a guideline to policy makers to promote the Internet as a functional instrument for a global scientific knowledge base. Beca...
Jens Klump, Roland Bertelmann, Jan Brase, Michael ...
ADMA
2006
Springer
220views Data Mining» more  ADMA 2006»
14 years 2 months ago
Mining and Validation of Localized Frequent Web Access Patterns with Dynamic Tolerance
Mining user profiles is a crucial task for Web usage mining, and can be accomplished by mining frequent patterns. However, in the Web usage domain, sessions tend to be very sparse,...
Olfa Nasraoui, Suchandra Goswami