Sciweavers

1039 search results - page 191 / 208
» Query reformulation with constraints
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 1 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
DASFAA
1997
IEEE
112views Database» more  DASFAA 1997»
15 years 1 months ago
Client-Server Optimization for Multimedia Document Exchange
The success of the World Wide Web is boosting the development of multimedia database systems and their integration into the internet. For the documents stored and exchanged in the...
Gerhard Köstler, Wolfgang L. J. Kowarschick, ...
ICDT
1990
ACM
110views Database» more  ICDT 1990»
15 years 1 months ago
Beginnings of a Theory of General Database Completions
Ordinary logical implication is not enough for answering queries in a logic database, since especially negative information is only implicitly represented in the database state. M...
Stefan Brass
94
Voted
DMSN
2007
ACM
15 years 1 months ago
A graph-based approach to vehicle tracking in traffic camera video streams
Vehicle tracking has a wide variety of applications, from law enforcement to traffic planning and public safety. However, the image resolution of the videos available from most tr...
Hamid Haidarian Shahri, Galileo Namata, Saket Navl...
86
Voted
APNOMS
2006
Springer
15 years 1 months ago
Information-Driven Task Routing for Network Management in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of a large collection of small nodes providing collaborative and distributed sensing ability in unpredictable environments. Given their unat...
Yu Liu, Yumei Wang, Lin Zhang, Chan-Hyun Youn