Sciweavers

863 search results - page 24 / 173
» Computational Methods for Intelligent Information Access
Sort
View
SACMAT
2010
ACM
15 years 6 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
FLAIRS
2003
15 years 3 months ago
Belief Revision and Information Fusion in a Probabilistic Environment
This paper presents new methods for probabilistic belief revision and information fusion. By making use of the principles of optimum entropy (ME-principles), we define a generali...
Gabriele Kern-Isberner, Wilhelm Rödder
COMPSAC
2006
IEEE
15 years 8 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
BMCBI
2008
154views more  BMCBI 2008»
15 years 2 months ago
Sequence based residue depth prediction using evolutionary information and predicted secondary structure
Background: Residue depth allows determining how deeply a given residue is buried, in contrast to the solvent accessibility that differentiates between buried and solvent-exposed ...
Hua Zhang, Tuo Zhang, Ke Chen 0003, Shiyi Shen, Ji...
ACL
2010
15 years 7 hour ago
Mood Patterns and Affective Lexicon Access in Weblogs
The emergence of social media brings chances, but also challenges, to linguistic analysis. In this paper we investigate a novel problem of discovering patterns based on emotion an...
Thin Nguyen