Sciweavers

5064 search results - page 981 / 1013
» Web Information Management System: Personalization and Gener...
Sort
View
CCS
2006
ACM
15 years 1 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
CCS
2009
ACM
15 years 4 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
93
Voted
SACMAT
2005
ACM
15 years 3 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
RIAO
2000
14 years 11 months ago
Speaker change detection using joint audio-visual statistics
In this paper, we present an approach for speaker change detection in broadcast video using joint audio-visual scene change statistics. Our experiments indicate that using joint a...
Giridharan Iyengar, Chalapathy Neti, Sankar Basu
WWW
2010
ACM
15 years 4 months ago
Pusic: musicalize microblog messages for summarization and exploration
Micro-blogging services provide platforms for users to share their feelings and ideas on the go. Desiging to produce information stream in almost micro-blogging services, although...
Cheng-Te Li, Hung-Che Lai, Chien-Tung Ho, Chien-Li...