Sciweavers

3303 search results - page 130 / 661
» Multidimensional Access Methods
Sort
View
129
Voted
COMPSAC
2010
IEEE
14 years 10 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
145
Voted
RR
2010
Springer
14 years 11 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
TKDE
1998
139views more  TKDE 1998»
15 years 11 days ago
Distributed Optimistic Concurrency Control Methods for High-Performance Transaction Processing
—There is an ever-increasing demand for more complex transactions and higher throughputs in transaction processing systems leading to higher degrees of transaction concurrency an...
Alexander Thomasian
111
Voted
WEBNET
2000
15 years 2 months ago
Mining the Most Interesting Web Access Associations
: Web access patterns can provide valuable information for website designers in making website-based communication more efficient. To extract interesting or useful web access patte...
Li Shen, Ling Cheng, James Ford, Fillia Makedon, V...
95
Voted
ICIP
2001
IEEE
16 years 2 months ago
Capturing image semantics with low-level descriptors
: We conducted psychophysical experiments to gain insight into the semantic categories that guide the human perception of image similarity. We analyzed the perceptual data using mu...
Aleksandra Mojsilovic, Bernice E. Rogowitz