Sciweavers

863 search results - page 24 / 173
» Computational Methods for Intelligent Information Access
Sort
View
SACMAT
2010
ACM
15 years 4 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
FLAIRS
2003
15 years 1 months ago
Belief Revision and Information Fusion in a Probabilistic Environment
This paper presents new methods for probabilistic belief revision and information fusion. By making use of the principles of optimum entropy (ME-principles), we define a generali...
Gabriele Kern-Isberner, Wilhelm Rödder
COMPSAC
2006
IEEE
15 years 6 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
BMCBI
2008
154views more  BMCBI 2008»
14 years 12 months ago
Sequence based residue depth prediction using evolutionary information and predicted secondary structure
Background: Residue depth allows determining how deeply a given residue is buried, in contrast to the solvent accessibility that differentiates between buried and solvent-exposed ...
Hua Zhang, Tuo Zhang, Ke Chen 0003, Shiyi Shen, Ji...
ACL
2010
14 years 10 months ago
Mood Patterns and Affective Lexicon Access in Weblogs
The emergence of social media brings chances, but also challenges, to linguistic analysis. In this paper we investigate a novel problem of discovering patterns based on emotion an...
Thin Nguyen