Sciweavers

1147 search results - page 59 / 230
» Transformation of Access Rights
Sort
View
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
14 years 8 months ago
UbiData: Requirements and Architecture for Ubiquitous Data Access
Mobile users today demand ubiquitous access to their data from any mobile device and under variable connection quality. We refer to this requirement as any-time, any-where data ac...
Abdelsalam Helal, Joachim Hammer
UAIS
2011
237views more  UAIS 2011»
13 years 3 months ago
Game accessibility: a survey
Over the last three decades, video games have evolved from a pastime into a force of change that is transforming the way people perceive, learn about, and interact with the world a...
Bei Yuan, Eelke Folmer, Frederick C. Harris
ICML
1997
IEEE
14 years 9 months ago
Predicting Multiprocessor Memory Access Patterns with Learning Models
Machine learning techniques are applicable to computer system optimization. We show that shared memory multiprocessors can successfully utilize machine learning algorithms for mem...
M. F. Sakr, Steven P. Levitan, Donald M. Chiarulli...
EDOC
2003
IEEE
14 years 2 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
ASWC
2006
Springer
13 years 10 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...