Sciweavers

1611 search results - page 223 / 323
» An Access Control Model for Video Database Systems
Sort
View
PAA
2008
14 years 9 months ago
Prototype reduction using an artificial immune model
Artificial immune system (AIS)-based pattern classification approach is relatively new in the field of pattern recognition. The study explores the potentiality of this paradigm in ...
Utpal Garain
CIVR
2007
Springer
119views Image Analysis» more  CIVR 2007»
15 years 4 months ago
An in-memory relevance feedback technique for high-performance image retrieval systems
Content-based image retrieval with relevant feedback has been widely adopted as the query model of choice for improved effectiveness in image retrieval. The effectiveness of thi...
Ning Yu, Khanh Vu, Kien A. Hua
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
15 years 10 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
GLOBECOM
2008
IEEE
14 years 11 months ago
On the Impact of Inter-Cell Interference in LTE
—While intercell interference coordination (ICIC) for the downlink of multi-cell systems in general and orthogonal frequency division multiple access (OFDMA) networks in particul...
András Rácz, Norbert Reider, G&aacut...
DMDW
2000
118views Management» more  DMDW 2000»
14 years 11 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore