Sciweavers

1521 search results - page 132 / 305
» Role analysis
Sort
View
ICCS
2009
Springer
15 years 6 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
ETFA
2005
IEEE
15 years 5 months ago
Designing usable decision support systems for HVM
In High Volume Manufacturing (HVM), system control is shared between automation and human workers. The social organisation of workers plays an important role in supporting human d...
Connor Upton, Gavin Doherty
HT
2010
ACM
15 years 4 months ago
Discovery of information disseminators and receptors on online social media
Today, there is significant sharing of information artifacts among users on various social media sites, including Digg, Twitter and Flickr. An interesting consequence of such ric...
Munmun De Choudhury
HICSS
2002
IEEE
76views Biometrics» more  HICSS 2002»
15 years 4 months ago
Synchronizing Pace in Asynchronous Global Virtual Project Teams
In this study, we explore the nature of team interaction and the role of temporal coordination in asynchronously communicating global virtual project teams (GVPTs). Drawing on Tim...
Anne P. Massey, Mitzi M. Montoya-Weiss, Yu-Ting Ca...
ICDE
1991
IEEE
175views Database» more  ICDE 1991»
15 years 3 months ago
Constraint-Based Reasoning in Deductive Databases
— Constraints play an important role in the efficient query evaluation in deductive databases. In this paper, constraint-based query evaluation in deductive databases is investi...
Jiawei Han