Sciweavers

1836 search results - page 218 / 368
» Hierarchies for semantic classes
Sort
View
CCS
2008
ACM
15 years 2 days ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
AVI
2006
14 years 11 months ago
Navigation in degree of interest trees
We present an experiment that compares how people perform search tasks in a degree-of-interest browser and in a Windows-Explorer-like browser. Our results show that, whereas users...
Raluca Budiu, Peter Pirolli, Michael Fleetwood
TREC
2004
14 years 11 months ago
Experiments with Web QA System and TREC 2004 Questions
We describe our first participation in TREC. We only competed in the Question Answering (QA) category and limited our runs to factoids. Our approach was to use our open domain QA ...
Dmitri Roussinov, Yin Ding, Jose Antonio Robles-Fl...
COLING
2000
14 years 11 months ago
Word Sense Disambiguation of Adjectives Using Probabilistic Networks
In this paper, word sense dismnbiguation (WSD) accuracy achievable by a probabilistic classifier, using very milfimal training sets, is investigated. \Ve made the assuml)tiou that...
Gerald Chao, Michael G. Dyer
RBAC
1997
234views more  RBAC 1997»
14 years 11 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley