Sciweavers

1611 search results - page 209 / 323
» An Access Control Model for Video Database Systems
Sort
View
RBAC
1998
84views more  RBAC 1998»
14 years 11 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
ADBIS
2007
Springer
125views Database» more  ADBIS 2007»
15 years 4 months ago
Towards Self-Optimization of Message Transformation Processes
The Message Transformation Model (MTM), for modeling complex message transformation processes in data centric application scenarios, provides strong capabilities for describing the...
Matthias Böhm, Dirk Habich, Uwe Wloka, Jü...
CEC
2009
IEEE
15 years 4 months ago
Evolving morphology and control: A distributed approach
—In this paper we present a model which allows to co-evolve the morphology and the control system of realistically simulated robots (creatures). The method proposed is based on a...
Mariagiovanna Mazzapioda, Angelo Cangelosi, Stefan...
VLDB
1997
ACM
103views Database» more  VLDB 1997»
15 years 2 months ago
Incremental Organization for Data Recording and Warehousing
Data warehouses and recording systems typically have a large continuous stream of incoming data, that must be stored in a manner suitable for future access. Access to stored recor...
H. V. Jagadish, P. P. S. Narayan, S. Seshadri, S. ...
EUROCRYPT
2004
Springer
15 years 3 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai