Sciweavers

1611 search results - page 101 / 323
» An Access Control Model for Video Database Systems
Sort
View
135
Voted
PCM
2004
Springer
118views Multimedia» more  PCM 2004»
15 years 9 months ago
Reach-Through-the-Screen: A New Metaphor for Remote Collaboration
For some years, our group at FX Palo Alto Laboratory has been developing technologies to support meeting recording, collaboration, and videoconferencing. This paper presents severa...
Jonathan Foote, Qiong Liu, Don Kimber, Patrick Chi...
228
Voted
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
16 years 5 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi
146
Voted
CCS
2006
ACM
15 years 7 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
EJC
2010
14 years 10 months ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser
147
Voted
SEMWEB
2009
Springer
15 years 10 months ago
A Database Backend for OWL
Abstract. Most Semantic Web applications are build on top of technology based on the Semantic Web layer cake and the W3C ontology languages RDF(S) and OWL. However RDF(S) embodies ...
Jörg Henss, Joachim Kleb, Stephan Grimm