Sciweavers

1611 search results - page 149 / 323
» An Access Control Model for Video Database Systems
Sort
View
167
Voted
KDD
2004
ACM
147views Data Mining» more  KDD 2004»
15 years 9 months ago
Semantic representation: search and mining of multimedia content
Semantic understanding of multimedia content is critical in enabling effective access to all forms of digital media data. By making large media repositories searchable, semantic ...
Apostol Natsev, Milind R. Naphade, John R. Smith
ISCI
2007
133views more  ISCI 2007»
15 years 3 months ago
Decision making in fuzzy discrete event systems
The primary goal of the study presented in this paper is to develop a novel and comprehensive approach to decision making using fuzzy discrete event systems (FDES) and to apply su...
Feng Lin, Hao Ying, R. D. MacArthur, J. A. Cohn, D...
150
Voted
USS
2008
15 years 6 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
CCS
2007
ACM
15 years 10 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
SIGMOD
2000
ACM
121views Database» more  SIGMOD 2000»
15 years 8 months ago
TIP: A Temporal Extension to Informix
Commercial relational database systems today provide only limited temporal support. To address the needs of applications requiring rich temporal data and queries, we have built TI...
Jun Yang 0001, Huacheng C. Ying, Jennifer Widom