Sciweavers

2250 search results - page 24 / 450
» Authorizing applications in singularity
Sort
View
SCIENTOMETRICS
2010
124views more  SCIENTOMETRICS 2010»
14 years 8 months ago
The mathematical review system: does reviewer status play a role in the citation process?
This paper revisits an aspect of citation theory (i.e., citer motivation) with respect to the Mathematical Review system and the reviewer’s role in mathematics. We focus on a se...
Alesia Zuccalá
ICMCS
1999
IEEE
128views Multimedia» more  ICMCS 1999»
15 years 1 months ago
Media Actors: Characters in Search of an Author
Interactive experiences benefit from natural interactions, compelling communication, and ease of implementation. We show how, according to these principles, interactive media arch...
Flavia Sparacino, Glorianna Davenport, Alex Pentla...
DBA
2004
88views Database» more  DBA 2004»
14 years 11 months ago
A Flexible Database Authorization System
In this paper we present an authorization mechanism for a relational database. It allows defining the user privileges exact to a table row. To implement that we used the INSTEAD t...
Bazyli Blicharski, Krzysztof Stencel
CCS
2010
ACM
15 years 4 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
VLDB
2007
ACM
154views Database» more  VLDB 2007»
15 years 3 months ago
P2P Authority Analysis for Social Communities
PageRank-style authority analyses of Web graphs are of great importance for Web mining. Such authority analyses also apply to hot “Web 2.0” applications that exhibit a natural...
Josiane Xavier Parreira, Sebastian Michel, Matthia...