-
2
-
-
0001655091
-
A generalization of the Bayesian inference. Journal of Royal Statistical, 1968
-
A. P. Dempster. "A generalization of the Bayesian inference". Journal of Royal Statistical, 1968, Society 30: pp. 205-447.
-
Society
, vol.30
, pp. 205-447
-
-
Dempster, A.P.1
-
3
-
-
34748816473
-
-
ASP Alliance, http://aspalliance.com/404_Image_Web_Service, (22/10/2006)
-
ASP Alliance, http://aspalliance.com/404_Image_Web_Service, (22/10/2006)
-
-
-
-
5
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati: "Supporting location-based conditions in access control policies". ASIACCS 2006: pp. 212-222
-
ASIACCS 2006
, pp. 212-222
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Capitani di Vimercati, S.4
Samarati, P.5
-
6
-
-
0019608720
-
Formal models of computer security
-
Sept
-
C. E. Landwehr, "Formal models of computer security," ACM Comput. Surv., 13(3), Sept. 1981: pp. 247-278.
-
(1981)
ACM Comput. Surv
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
7
-
-
2942558770
-
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
-
C. Wullems, M. Looi, A. Clark: "Towards Context-aware Security: An Authorization Architecture for Intranet Environments". PerCom Workshops 2004: pp. 132-137
-
(2004)
PerCom Workshops
, pp. 132-137
-
-
Wullems, C.1
Looi, M.2
Clark, A.3
-
8
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
February
-
D. F. Ferraiolo, J. F. Barkley, D. R. Kuhn, "A role-based access control model and reference implementation within a corporate intranet", ACM Transactions on Information and System Security, February 1999, 2(1): pp. 34-64.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
9
-
-
63649149206
-
-
D. Poole. Logic, knowledge representation, and Bayesian decision theory. In Proceedings CL-2000, 2000 pp. 70-86
-
D. Poole. Logic, knowledge representation, and Bayesian decision theory. In Proceedings CL-2000, 2000 pp. 70-86
-
-
-
-
10
-
-
34748817090
-
-
Efg2 Computer labs, http://www.efg2.com/Lab/Library/ImageProcessing/ SoftwarePackages.htm (05/10/2006)
-
Efg2 Computer labs, http://www.efg2.com/Lab/Library/ImageProcessing/ SoftwarePackages.htm (05/10/2006)
-
-
-
-
12
-
-
34748881498
-
Colour Object recognition combining Motion Descriptors, Zernike Moments and Support Vector Machine
-
France
-
F. Smach, C. Lemaitre, J. Miteran, J. Gauthier, M. Atri, "Colour Object recognition combining Motion Descriptors, Zernike Moments and Support Vector Machine", Proceedings of IECON'06, IEEE, Parts-CNAM, France, 2006, pp. 3238-3242
-
(2006)
Proceedings of IECON'06, IEEE, Parts-CNAM
, pp. 3238-3242
-
-
Smach, F.1
Lemaitre, C.2
Miteran, J.3
Gauthier, J.4
Atri, M.5
-
13
-
-
34748914494
-
Towards Fully Functional Distributed MultiMedia DBMS
-
September
-
G. Chalhoub, S. Saad, R. Chbeir, K. Yétongnon, "Towards Fully Functional Distributed MultiMedia DBMS", Journal Of Digital Information Management (JDIM), 2(3), September 2004: pp.116-121.
-
(2004)
Journal Of Digital Information Management (JDIM)
, vol.2
, Issue.3
, pp. 116-121
-
-
Chalhoub, G.1
Saad, S.2
Chbeir, R.3
Yétongnon, K.4
-
15
-
-
34748830609
-
TEC, http://www.chiariglione.org/mpeg/standards/mpeg-7/mpeg-7.htm,
-
ISO/ 27/10
-
ISO/TEC, http://www.chiariglione.org/mpeg/standards/mpeg-7/mpeg-7.htm, (27/10/2006)
-
(2006)
-
-
-
16
-
-
34748889200
-
-
J. Hu, A. C. Weaver, Dynamic Context-Aware Access Control for Distributed Healthcare Applications. In proceedings of First Workshop on Pervasive Security, Privacy and Trust (PSPT), Boston MA, 2004.
-
J. Hu, A. C. Weaver, "Dynamic Context-Aware Access Control for Distributed Healthcare Applications". In proceedings of First Workshop on Pervasive Security, Privacy and Trust (PSPT), Boston MA, 2004.
-
-
-
-
17
-
-
34748815207
-
-
Java Community Press, http://jcp.org/en/jsr/detail?id=135, (12/11/2006)
-
Java Community Press, http://jcp.org/en/jsr/detail?id=135, (12/11/2006)
-
-
-
-
18
-
-
33646759918
-
RDF-Based Model for Context-Aware Reasoning in Rich Service Environment
-
J. Forstadius, O. Lassila, T. Seppanen: "RDF-Based Model for Context-Aware Reasoning in Rich Service Environment". PerCom Workshops 2005: pp. 15-19
-
(2005)
PerCom Workshops
, pp. 15-19
-
-
Forstadius, J.1
Lassila, O.2
Seppanen, T.3
-
19
-
-
11244257278
-
A Policy Based Context-aware Service for Next Generation Networks
-
8-10 Sept, London
-
K. Jean, K. Yang, A. Galis, -"A Policy Based Context-aware Service for Next Generation Networks", 8th London Communication Symposium, 8-10 Sept 2003, London
-
(2003)
8th London Communication Symposium
-
-
Jean, K.1
Yang, K.2
Galis, A.3
-
20
-
-
33645696376
-
Using Context and Similarity for Face and Location Identification
-
San Jose, California, IS&T/SPIE Press
-
M. Davis, M. Smith, F. Stentiford, A. Bambidele, J. Canny, N. Good, S. King, and R. Janakiraman. "Using Context and Similarity for Face and Location Identification". Proc. IS&T/SPIE 18th Annual Symposium on Electronic Imaging Science and Technology Internet Imaging VII, San Jose, California, IS&T/SPIE Press, 2006
-
(2006)
Proc. IS&T/SPIE 18th Annual Symposium on Electronic Imaging Science and Technology Internet Imaging VII
-
-
Davis, M.1
Smith, M.2
Stentiford, F.3
Bambidele, A.4
Canny, J.5
Good, N.6
King, S.7
Janakiraman, R.8
-
21
-
-
0141876269
-
Generalized role-based access control for securing future applications
-
Baltimore, Md, Oct. pp
-
M. J. Covington, M. J. Moyer, and M. Ahamad. "Generalized role-based access control for securing future applications". In Proceedings of the 23rd National Information Systems Security Conference, NISSC 2000, Baltimore, Md., Oct. pp.16-19.
-
Proceedings of the 23rd National Information Systems Security Conference, NISSC 2000
, pp. 16-19
-
-
Covington, M.J.1
Moyer, M.J.2
Ahamad, M.3
-
22
-
-
84948995473
-
A Context-Aware Security Architecture for Emerging Applications
-
M. J. Covington, P. Fogla, Z. Zhan, M. Ahamad: "A Context-Aware Security Architecture for Emerging Applications". ACSAC 2002: pp. 249-260
-
ACSAC 2002
, pp. 249-260
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
23
-
-
0035791053
-
Securing context-aware applications using environment roles
-
M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, G. D. Abowd, "Securing context-aware applications using environment roles". SACMAT 2001: pp.10-20
-
SACMAT 2001
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
24
-
-
34748917283
-
-
Oracle Technology Network, http://www.oracle.com/technology/products/ intermedia/index.html, (20/09/2006)
-
Oracle Technology Network, http://www.oracle.com/technology/products/ intermedia/index.html, (20/09/2006)
-
-
-
-
25
-
-
0033896924
-
Privacy Algorithm for Cylindrical Holographic weapons surveillance system
-
Feb
-
P.E. Keller, D.L. McMakin, D.M. Sheen, A.D. McKinnon, Summet, J.W., "Privacy Algorithm for Cylindrical Holographic weapons surveillance system", Aerospace and Electronic Systems Magazine, IEEE, Feb 2000, pp. 17-24
-
(2000)
Aerospace and Electronic Systems Magazine, IEEE
, pp. 17-24
-
-
Keller, P.E.1
McMakin, D.L.2
Sheen, D.M.3
McKinnon, A.D.4
Summet, J.W.5
-
26
-
-
20844435938
-
A Trust-Based Context-Aware Access Control Model for Web-Services
-
R. Bhatti, E. Bertino, A. Ghafoor: "A Trust-Based Context-Aware Access Control Model for Web-Services". Distributed and Parallel Databases 18(1) 2005, pp. 83-105
-
(2005)
Distributed and Parallel Databases
, vol.18
, Issue.1
, pp. 83-105
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
-
27
-
-
34748863820
-
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach
-
R. Wolf, M. Schneider: "Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach". MMM-ACNS 2003: pp. 267-278
-
(2003)
MMM-ACNS
, pp. 267-278
-
-
Wolf, R.1
Schneider, M.2
-
29
-
-
34748865112
-
-
DB2 Image Extenders, QBIC, http://wwwqbic.almaden.ibm.com/ (27/12/2006)
-
DB2 Image Extenders, QBIC, http://wwwqbic.almaden.ibm.com/ (27/12/2006)
-
-
-
|