Sciweavers

1363 search results - page 131 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
ETFA
2005
IEEE
15 years 4 months ago
Fuzzy multi-objective optimization for network design of logistic and production systems
Global competition has given rise to Logistic and Production Systems (LPSs), that are distributed manufacturing systems integrating international logistics and information technol...
Mariagrazia Dotoli, Maria Pia Fanti, Agostino Marc...
SACMAT
2004
ACM
15 years 4 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann
CINQ
2004
Springer
125views Database» more  CINQ 2004»
15 years 4 months ago
The Hows, Whys, and Whens of Constraints in Itemset and Rule Discovery
Many researchers in our community (this author included) regularly emphasize the role constraints play in improving performance of data-mining algorithms. This emphasis has led to ...
Roberto J. Bayardo
PCM
2004
Springer
179views Multimedia» more  PCM 2004»
15 years 4 months ago
Digital Video Scrambling Method Using Intra Prediction Mode
Abstract. As the amount of digitalized contents increases rapidly, ‘security’ necessarily arises as one of the most important issues. The main distribution channel of digital c...
Jinhaeng Ahn, Hiuk Jae Shim, Byeungwoo Jeon, Incho...
ICALT
2003
IEEE
15 years 4 months ago
A Metadata Model for Capturing Presentations
This paper describes the design of a metadata model for capturing presentations developed as part of the VACE project (Video and Audio Capturing and Embedding). VACE is a modular,...
Ralf Einhorn, Stephan Olbrich, Wolfgang Nejdl