Sciweavers

7623 search results - page 1303 / 1525
» Constructive Volume Modeling
Sort
View
SACMAT
2003
ACM
15 years 9 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
SC
2003
ACM
15 years 9 months ago
Synthesizing Realistic Computational Grids
Realistic workloads are essential in evaluating middleware for computational grids. One important component is the raw grid itself: a network topology graph annotated with the har...
Dong Lu, Peter A. Dinda
SIGIR
2003
ACM
15 years 9 months ago
Implicit link analysis for small web search
Current Web search engines generally impose link analysis-based re-ranking on web-page retrieval. However, the same techniques, when applied directly to small web search such as i...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...
AIME
2003
Springer
15 years 9 months ago
Attribute Interactions in Medical Data Analysis
There is much empirical evidence about the success of naive Bayesian classification (NBC) in medical applications of attribute-based machine learning. NBC assumes conditional inde...
Aleks Jakulin, Ivan Bratko, Dragica Smrke, Janez D...
ASIACRYPT
2003
Springer
15 years 9 months ago
Generalized Powering Functions and Their Application to Digital Signatures
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Ka...
« Prev « First page 1303 / 1525 Last » Next »