Sciweavers

2926 search results - page 542 / 586
» Document Analysis
Sort
View
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
14 years 9 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
JTAER
2006
70views more  JTAER 2006»
14 years 9 months ago
Australian Franchisor websites: Moving towards network behaviour
Australia is one of the leading nations using the internet in both business-to-consumer (B2C) and business-tobusiness (B2B) settings (ABS 2004). However, little academic attention...
Sally Rao, Lorelle Frazer
90
Voted
KES
2006
Springer
14 years 9 months ago
M-OntoMat-Annotizer: Image Annotation Linking Ontologies and Multimedia Low-Level Features
Annotations of multimedia documents typically have been pursued in two different directions. Either previous approaches have focused on low level descriptors, such as dominant colo...
Kosmas Petridis, Dionysios Anastasopoulos, Carsten...
CAD
2005
Springer
14 years 9 months ago
Creation of a unit block library of architectures for use in assembled scaffold engineering
Guided tissue regeneration is gaining importance in the field of orthopaedic tissue engineering as need and technology permits the development of site-specific engineering approac...
M. A. Wettergreen, B. S. Bucklen, Binil Starly, E....
TSE
2008
128views more  TSE 2008»
14 years 9 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón