Sciweavers

5252 search results - page 62 / 1051
» Logic in Access Control
Sort
View
126
Voted
SOCIALCOM
2010
14 years 10 months ago
OSNAC: An Ontology-based Access Control Model for Social Networking Systems
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
Amirreza Masoumzadeh, James B. D. Joshi
IJCSS
2000
84views more  IJCSS 2000»
15 years 12 days ago
Self-Optimization Combined with Fuzzy Logic Control for Ball Mill
A new control strategy of self-optimization combined with fuzzy logic control for ball mill is proposed in the paper. This new control strategy is implemented in a Thermal Power Pl...
Lixin Jia, Xinzhong Li
GLVLSI
1996
IEEE
145views VLSI» more  GLVLSI 1996»
15 years 4 months ago
Boolean Function Representation Using Parallel-Access Diagrams
Inthispaperweintroduceanondeterministiccounterpart to Reduced, Ordered Binary Decision Diagrams for the representation and manipulation of logic functions. ROBDDs are conceptually...
Valeria Bertacco, Maurizio Damiani
95
Voted
IM
2003
15 years 1 months ago
Multiple Authorization - A Model and Architecture for Increased, Practical Security
: Security of systems and management infrastructure is crucial for a successful, reliable and safe use. Most currently deployed systems are based on simple subject/object-relations...
Gerald Vogt
92
Voted
CR
2001
151views Education» more  CR 2001»
15 years 2 months ago
Layers of Meaning: Disentangling Subject Access Interoperability
ACT n are ge. subject access ieved. In order to facilitate subject access interoperability a mechanism must be built that allows the different controlled vocabularies to communicat...
Joseph T. Tennis