Sciweavers

1635 search results - page 290 / 327
» Cross-layer memory management for managed language applicati...
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 3 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
CIKM
2009
Springer
15 years 2 months ago
Terminology mining in social media
The highly variable and dynamic word usage in social media presents serious challenges for both research and those commercial applications that are geared towards blogs or other u...
Magnus Sahlgren, Jussi Karlgren
AIRS
2006
Springer
15 years 2 months ago
A Semantic Fusion Approach Between Medical Images and Reports Using UMLS
One of the main challenges in content-based image retrieval still remains to bridge the gap between low-level features and semantic information. In this paper, we present our first...
Daniel Racoceanu, Caroline Lacoste, Roxana Teodore...
CLEF
2006
Springer
15 years 2 months ago
iCLEF 2006 Overview: Searching the Flickr WWW Photo-Sharing Repository
This paper summarizes the task design for iCLEF 2006 (the CLEF interactive track). Compared to previous years, we have proposed a radically new task: searching images in a natural...
Jussi Karlgren, Julio Gonzalo, Paul Clough
EDBTW
2006
Springer
15 years 2 months ago
Data Stream Sharing
Abstract. Recent research efforts in the fields of data stream processing and data stream management systems (DSMSs) show the increasing importance of processing data streams, e. g...
Richard Kuntschke, Alfons Kemper