Sciweavers

3101 search results - page 532 / 621
» Using Relational Databases in the Engineering Repository Sys...
Sort
View
POLICY
2001
Springer
15 years 9 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ACM
1995
15 years 8 months ago
Rough Sets
We study properties of rough sets, that is, approximations to sets of records in a database or, more formally, to subsets of the universe of an information system. A rough set is a...
Zdzislaw Pawlak
SACMAT
2010
ACM
15 years 9 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
ATAL
2008
Springer
15 years 6 months ago
Reusing models in multi-agent simulation with software components
on models are abstract representations of systems one wants to study through computer simulation. In multiagent based simulation, such models usually represent agents and their re...
Paulo Salem da Silva, Ana Cristina Vieira de Melo
CVPR
2003
IEEE
16 years 6 months ago
What is the Space of Camera Response Functions?
Many vision applications require precise measurement of scene radiance. The function relating scene radiance to image brightness is called the camera response. We analyze the prop...
Michael D. Grossberg, Shree K. Nayar