One of the most important steps towards eective software maintenance of a large complicated system is to understand how program features are spread over the entire system and thei...
W. Eric Wong, Swapna S. Gokhale, Joseph Robert Hor...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
In this paper we describe our experiments in the automatic and interactive search tasks of TRECVID 2008. We submitted six runs, five of them are automatic and one is interactive. ...
P. Punitha, Thierry Urruty, Yue Feng, Martin Halve...
In this paper, we argue that only using behavioural motion information, we are able to predict the interest of observers when looking at face-to-face interactions. We propose a set...
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...