Sciweavers

5577 search results - page 74 / 1116
» E2K Technology and Implementation
Sort
View
WETICE
1997
IEEE
15 years 3 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
CAINE
2007
15 years 18 days ago
Wildcards in Math Search, Implementation Issues
Math search is a new area of research with many enabling technologies but also many challenges. Some of the enabling technologies include XML, XPath, XQuery, and MathML. Some of t...
Moody Ebrahem Altamimi, Abdou S. Youssef
ICONIP
2007
15 years 17 days ago
Analog CMOS Circuits Implementing Neural Segmentation Model Based on Symmetric STDP Learning
We proposed a neural segmentation model that is suitable for implementation in analog VLSIs using conventional CMOS technology. The model consists of neural oscillators mutually co...
Gessyca Maria Tovar, Eric Shun Fukuda, Tetsuya Asa...
MOBIMEDIA
2007
15 years 17 days ago
Implementation aspects of a delegation system
In this paper we simulate an authorization and delegation system using knowledge based technology. This proposal is part of a visual tool that is intended to be an implementation ...
Isaac Agudo, Javier Lopez, José A. Monteneg...
JKM
2007
161views more  JKM 2007»
14 years 11 months ago
A strategy-based ontology of knowledge management technologies
Purpose – The purpose of this paper is to distinguish and describe knowledge management (KM) technologies according to their support for strategy. Design/methodology/approach â€...
Andre Saito, Katsuhiro Umemoto, Mitsuru Ikeda