Sciweavers

5577 search results - page 45 / 1116
» E2K Technology and Implementation
Sort
View
OTM
2007
Springer
15 years 5 months ago
A Role and Attribute Based Access Control System Using Semantic Web Technologies
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
Lorenzo Cirio, Isabel F. Cruz, Roberto Tamassia
ADBIS
2006
Springer
118views Database» more  ADBIS 2006»
15 years 5 months ago
Computational Database Technology Applied to Option Pricing Via Finite Differences
Computational database technology spans the two research fields data-base technology and scientific computing. It involves development of database capabilities that support compu...
Jöns Åkerlund, Krister Åhlander, ...
155
Voted
ICSC
1999
Springer
148views Image Analysis» more  ICSC 1999»
15 years 3 months ago
Applications of Aglet Technology
The Internet has evolved from an information space to a market space with thousands of electronic storefronts, auctions and other commercial services. This market space is not with...
Rosane Maria Martins, Magali Ribeiro Chaves, Luci ...
DAC
1994
ACM
15 years 3 months ago
Technology Mapping Using Fuzzy Logic
- This paper presents a placement-driven technology mapping procedure based on fuzzy delay curves. The fuzziness has been introduced to deal with the inherent vagueness in wiring l...
Sasan Iman, Massoud Pedram, Kamal Chaudhary
CMS
2006
110views Communications» more  CMS 2006»
15 years 14 days ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...