Sciweavers

4134 search results - page 494 / 827
» Collaborative Practice Research
Sort
View
DBSEC
2009
130views Database» more  DBSEC 2009»
15 years 6 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
164
Voted
BMCBI
2006
128views more  BMCBI 2006»
15 years 5 months ago
New directions in biomedical text annotation: definitions, guidelines and corpus construction
Background: While biomedical text mining is emerging as an important research area, practical results have proven difficult to achieve. We believe that an important first step tow...
W. John Wilbur, Andrey Rzhetsky, Hagit Shatkay
COMPSEC
2006
143views more  COMPSEC 2006»
15 years 5 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
IIE
2006
83views more  IIE 2006»
15 years 4 months ago
Is ICT a Lever for Educational Change? A Study of the Impact of ICT Implementation on Teaching and Learning in Hong Kong
Abstract. The ongoing, unprecedented growth of ICT, coupled with the globalisation of the economy, has created a huge challenge for education. This rapid growth of infusing ICT in ...
Emily M. L. Wong, Sandy C. Li
142
Voted
IJBC
2006
93views more  IJBC 2006»
15 years 4 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li