Sciweavers

1611 search results - page 184 / 323
» An Access Control Model for Video Database Systems
Sort
View
OTM
2010
Springer
14 years 8 months ago
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
In this paper, we present generic algorithms to ensure the consistency of mutual-exclusion and binding constraints in a business process context. We repeatedly identified the need...
Mark Strembeck, Jan Mendling
ESWS
2008
Springer
14 years 11 months ago
Entity Lifecycle Management for OKKAM
In this paper, we examine the special requirements of lifecycle management for entities in the context of an entity management system for the semantic web. We study the requirement...
Junaid Ahsenali Chaudhry, Themis Palpanas, Perikli...
CHI
2002
ACM
15 years 10 months ago
A flexible 3d sound system for interactive applications
We have developed a 3D sound system for headphones that allows real-time sound source and user displacement in a virtual acoustic environment. Because of a flexible design that us...
Lalya Gaye
ACSAC
2004
IEEE
15 years 1 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
DOLAP
1999
ACM
15 years 2 months ago
Design and Selection of Materialized Views in a Data Warehousing Environment: A Case Study
In this paper, we describe the design of a data warehousing system for an engineering company ‘R’. This system aims to assist users in retrieving data for business analysis in...
Goretti K. Y. Chan, Qing Li, Ling Feng