e-Government services are emerging rapidly in the developing world. Many countries use e-Government as an enabling tool to increase efficiency, enhance transparency, collect more ...
Vasileios Zarimpas, Maria Grouztidou, Despina Anas...
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...
Information gathering from multimedia retrieval systems is aided by effective visualization, but the degree to which visualization is effective depends in part on the way the cont...
Abstract—It is well known that for finite-sized networks, onestep retrieval in the autoassociative Willshaw net is a suboptimal way to extract the information stored in the syna...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...