Sciweavers

1147 search results - page 77 / 230
» Transformation of Access Rights
Sort
View
APSCC
2009
IEEE
14 years 3 months ago
Modeling and testing of cloud applications
What is a cloud application precisely? In this paper, we formulate a computing cloud as a kind of graph, a computing resource such as services or intellectual property access righ...
W. K. Chan, Lijun Mei, Zhenyu Zhang
CRIWG
2003
13 years 10 months ago
Building Virtual Communities for Information Retrieval
The search for relevant information is often hindered by the initial difficulty in formulating precise requests, and because much knowledge is actually tacit and thus not easily ac...
Daniel Memmi, Olivier Nérot
ENGL
2007
94views more  ENGL 2007»
13 years 8 months ago
Development of a Functional Neuromuscular Stimulation System for Independent Ambulation of Patients with a Spinal Cord Injury
— This paper proposes the use of a controlled assistive device, aimed as a support for the impaired individuals to allow a limited ambulatory function. The aim of the overall pro...
Alejandro Garcia Blanco, Gildardo Jimenez, Pedro O...
JSS
2000
76views more  JSS 2000»
13 years 8 months ago
Data placement schemes in replicated mirrored disk systems
In the present paper, we study the most frequent data placement schemes, i.e., the organ-pipe and camel arrangements, in a mirrored disk system which supports cylinder replication...
Athena Vakali, Yannis Manolopoulos
CSE
2009
IEEE
14 years 3 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu