Sciweavers

922 search results - page 2 / 185
» Attribute based data sharing with attribute revocation
Sort
View
AAAI
2007
13 years 7 months ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl
ACSAC
2002
IEEE
13 years 10 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
TVCG
2012
191views Hardware» more  TVCG 2012»
11 years 7 months ago
Direct Isosurface Visualization of Hex-Based High-Order Geometry and Attribute Representations
—In this paper, we present a novel isosurface visualization technique that guarantees the accurate visualization of isosurfaces with complex attribute data defined on (un)structu...
Tobias Martin, Elaine Cohen, Mike Kirby
RSFDGRC
2005
Springer
187views Data Mining» more  RSFDGRC 2005»
13 years 10 months ago
Handling Missing Attribute Values in Preterm Birth Data Sets
The objective of our research was to find the best approach to handle missing attribute values in data sets describing preterm birth provided by the Duke University. Five strategi...
Jerzy W. Grzymala-Busse, Linda K. Goodwin, Witold ...
CVPR
2011
IEEE
13 years 1 months ago
Sharing Features Between Objects and Their Attributes
Visual attributes expose human-defined semantics to object recognition models, but existing work largely restricts their influence to mid-level cues during classifier training....
Sung Ju Hwang, Fei Sha, Kristen Grauman