Sciweavers

2024 search results - page 213 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
179
Voted
SAMT
2007
Springer
168views Multimedia» more  SAMT 2007»
15 years 10 months ago
Video Summarisation for Surveillance and News Domain
Video summarization approaches have various fields of application, specifically related to organizing, browsing and accessing large video databases. In this paper we propose and ev...
Uros Damnjanovic, Tomas Piatrik, Divna Djordjevic,...
131
Voted
SACMAT
2010
ACM
15 years 2 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
117
Voted
CDC
2009
IEEE
138views Control Systems» more  CDC 2009»
15 years 8 months ago
Synthesis of a global asymptotic stabilizing feedback law for a system satisfying two different sector conditions
— Global asymptotic stabilization for a class of nonlinear systems is addressed. The dynamics of these systems are composed of a linear part to which is added some nonlinearities...
Vincent Andrieu, Christophe Prieur, Sophie Tarbour...
146
Voted
DIS
2009
Springer
15 years 10 months ago
A Dialectic Approach to Problem-Solving
We analyze the dynamics of problem-solving in a framework which captures two key features of that activity. The first feature is that problem-solving is a social game where a numb...
Éric Martin, Jean Sallantin
139
Voted
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 4 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald