Sciweavers

1147 search results - page 80 / 230
» Transformation of Access Rights
Sort
View
ESA
2003
Springer
93views Algorithms» more  ESA 2003»
14 years 2 months ago
Improved Bounds for Finger Search on a RAM
We present a new finger search tree with O(1) worst-case update time and O(log log d) expected search time with high probability in the Random Access Machine (RAM) model of comput...
Alexis C. Kaporis, Christos Makris, Spyros Sioutas...
IEAAIE
2003
Springer
14 years 2 months ago
Dialogue Management in an Automatic Meteorological Information System
Abstract. In this paper we present a real automatic meteorological information system that, not only provides friendly voice access to realtime data coming from automatic sensors, ...
Luis Villarejo, Núria Castell, Javier Herna...
WETICE
1998
IEEE
14 years 1 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
FIS
2008
13 years 10 months ago
Unlock Your Data: The Case of MyTag
The business model of Web2.0 applications like FaceBook, Flickr, YouTube and their likes is based on an asymmetry: Users generate content, Web2.0 application providers own, (i), th...
Thomas Franz, Klaas Dellschaft, Steffen Staab
ECIS
2003
13 years 10 months ago
Do you know your terms? - A procedure model for terminology management
Due to the extensive development und use of information technology, a lot of companies gained access to vast internal and external information sources. Yet nonetheless, efficiency...
Stefan Kremer, Lutz Kolbe, Walter Brenner