We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
This paper presents new methods for probabilistic belief revision and information fusion. By making use of the principles of optimum entropy (ME-principles), we define a generali...
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Background: Residue depth allows determining how deeply a given residue is buried, in contrast to the solvent accessibility that differentiates between buried and solvent-exposed ...
Hua Zhang, Tuo Zhang, Ke Chen 0003, Shiyi Shen, Ji...
The emergence of social media brings chances, but also challenges, to linguistic analysis. In this paper we investigate a novel problem of discovering patterns based on emotion an...