Sciweavers

3523 search results - page 90 / 705
» Feature interaction in policies
Sort
View
JSS
2000
59views more  JSS 2000»
14 years 9 months ago
Quantifying the closeness between program components and features
One of the most important steps towards eective software maintenance of a large complicated system is to understand how program features are spread over the entire system and thei...
W. Eric Wong, Swapna S. Gokhale, Joseph Robert Hor...
SACMAT
2003
ACM
15 years 3 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
TRECVID
2008
14 years 11 months ago
Glasgow University at TRECVID 2008
In this paper we describe our experiments in the automatic and interactive search tasks of TRECVID 2008. We submitted six runs, five of them are automatic and one is interactive. ...
P. Punitha, Thierry Urruty, Yue Feng, Martin Halve...
CCIA
2009
Springer
14 years 11 months ago
Measuring Interest of Human Dyadic Interactions
In this paper, we argue that only using behavioural motion information, we are able to predict the interest of observers when looking at face-to-face interactions. We propose a set...
Sergio Escalera, Oriol Pujol, Petia Radeva, Jordi ...
ITCC
2005
IEEE
15 years 3 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset