Role hierarchy

Results: 59



#Item
1

Determining Developers’ Expertise and Role: A Graph Hierarchy-based Approach Pamela Bhattacharya Michalis Faloutsos

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2014-08-05 16:52:08
    2

    LANGUAGE AND COGNITIVE PROCESSES 2011, 26 (9), 1402!1456 Electrophysiological evidence for use of the animacy hierarchy, but not thematic role assignment, during verb-argument processing

    Add to Reading List

    Source URL: pdfs.semanticscholar.org

    - Date: 2017-05-10 04:56:33
      3

      Hierarchy of the Church The Catholic Church has a hierarchical structure consisting of bishops, priests and deacons. The Bishop of Rome, the Pope, enjoys a special role in this hierarchical structure. However, the Primac

      Add to Reading List

      Source URL: www.scborromeo.org

      - Date: 2015-07-11 19:10:50
        4Computer security / Computer access control / Access control / Role-based access control / Data security / NIST RBAC model / Role hierarchy / Petri net / PERMIS / XACML / Model-based testing / Reliability engineering

        IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition Nets

        Add to Reading List

        Source URL: www.itrust.lu

        Language: English - Date: 2015-05-05 11:12:03
        5Computer access control / Access control / XACML / Role-based access control / PERMIS / Authorization / Role hierarchy / Data integration / Spring Framework / Attribute-Based Access Control / OAuth

        Role-Based Access Control for e-Service Integration Peter Lamb, Robert Power, Gavin Walker and Michael Compton CSIRO ICT Centre GPO Box 664 Canberra ACT 2601 Australia +

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2006-06-02 01:58:17
        6Security / Computer security / Access control / Computer access control / Role-based access control / Role hierarchy / PERMIS / Object Process Methodology / Database security / Metamodeling / Inference attack

        Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog

        Add to Reading List

        Source URL: www.db.informatik.uni-bremen.de

        Language: English - Date: 2014-12-06 08:06:31
        7

        Structuring Intelligence: The Role of Hierarchy, Modularity and Learning in Generating Intelligent Behaviour Joanna J. Bryson Artificial models of natural Intelligence University of Bath, United Kingdom

        Add to Reading List

        Source URL: www.cs.bath.ac.uk

        Language: English - Date: 2010-03-29 10:04:18
          8

          2138 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 12, DECEMBER 2013 Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy

          Add to Reading List

          Source URL: sefcom.asu.edu

          Language: English - Date: 2014-11-20 12:03:52
            9Syntax / Lexical semantics / Parts of speech / Word-sense disambiguation / WordNet / Part of speech / Lexical item / Part-of-speech tagging / Theta role / Linguistics / Computational linguistics / Grammar

            Classifying the Semantic Relations in Noun Compounds via a Domain-Specific Lexical Hierarchy Barbara Rosario and Marti Hearst School of Information Management & Systems University of California, Berkeley Berkeley, CA 94

            Add to Reading List

            Source URL: bailando.sims.berkeley.edu

            Language: English - Date: 2001-05-09 18:48:21
            10Phonetics / Vowels / Sonority hierarchy / Syllable / Diphthong / Consonant / Approximant consonant / Rhotic and non-rhotic accents / Sonority Sequencing Principle / Linguistics / Phonology / Phonotactics

            Articulatory bases of sonority in English liquids Michael Proctor and Rachel Walker1 Abstract. Sonority is generally considered to play a primary role in governing intrasyllabic phonotactics. In this chapter, we examine

            Add to Reading List

            Source URL: mproctor.net

            Language: English - Date: 2013-01-30 23:27:56
            UPDATE