Sciweavers

9272 search results - page 1532 / 1855
» Process Management Agent
Sort
View
140
Voted
SACMAT
2010
ACM
15 years 9 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
CIKM
1999
Springer
15 years 9 months ago
Architecture of a Networked Image Search and Retrieval System
Large scale networked image retrieval systems face a number of problems that are not fully satis ed by current systems. On one hand, integrated solutions that store all image data...
Roger Weber, Jürg Bolliger, Thomas R. Gross, ...
138
Voted
HIPC
1999
Springer
15 years 9 months ago
Microcaches
We describe a radically new cache architecture and demonstrate that it offers a huge reduction in cache cost, size and power consumption whilst maintaining performance on a wide ra...
David May, Dan Page, James Irwin, Henk L. Muller
MM
1998
ACM
150views Multimedia» more  MM 1998»
15 years 9 months ago
Zodiac: A History-Based Interactive Video Authoring System
Easy-to-use audio/video authoring tools play a crucial role in moving multimedia software from research curiosity to mainstream applications. However, research in multimedia author...
Tzi-cker Chiueh, Tulika Mitra, Anindya Neogi, Chua...
SIGCOMM
1998
ACM
15 years 9 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
« Prev « First page 1532 / 1855 Last » Next »