Sciweavers

7962 search results - page 1488 / 1593
» Conceptions of information science
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
AINA
2009
IEEE
15 years 4 months ago
Toward fMRI Group Identification Based on Brain Lateralization
— This research presents a novel application of Lateralization Index (LI) in support of a decision making process for the classification of subjects based on their brain activati...
Magno R. Guillen, Malek Adjouadi, Xiaozhen You, Ar...
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
15 years 4 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
SC
2009
ACM
15 years 4 months ago
Evaluating use of data flow systems for large graph analysis
Large graph analysis has become increasingly important and is widely used in many applications such as web mining, social network analysis, biology, and information retrieval. The...
Andy Yoo, Ian Kaplan
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
15 years 4 months ago
An exploration of climate data using complex networks
To discover patterns in historical data, climate scientists have applied various clustering methods with the goal of identifying regions that share some common climatological beha...
Karsten Steinhaeuser, Nitesh V. Chawla, Auroop R. ...
« Prev « First page 1488 / 1593 Last » Next »