Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
EfficientMatting: Bilateral Matting Network for Real-Time Human Matting
AbstractRecent human matting methods typically suffer from two drawbacks: 1) high computation overhead caused by multiple stages, and 2) limited practical application due to the need for auxiliary guidance (e.g., trimap, mask, or background). To address ...
- research-articleApril 2020
Fuzzy Modularity Based Louvain Algorithm For Overlapping Community Detection
ICIIP '19: Proceedings of the 4th International Conference on Intelligent Information ProcessingPages 18–23https://doi.org/10.1145/3378065.3378069Due to the fact that things may belong to multiple classifications, the traditional community partition algorithm cannot meet increasingly changing demands; the existing overlapping community partition algorithm still requires specific parameters in ...
- research-articleMarch 2020
Integrating Spectral-CF and FP-Growth for Recommendation
EBIMCS '19: Proceedings of the 2019 2nd International Conference on E-Business, Information Management and Computer ScienceArticle No.: 12, Pages 1–7https://doi.org/10.1145/3377817.3377845In the era of information overload, both information consumers and information producers have encountered great challenges: for information consumers, it is very difficult to find information of interest from a large amount of information. The ...
- research-articleAugust 2018
High Precision Laser Coding Method Based on Time Feedback
2018 IEEE International Conference on Mechatronics and Automation (ICMA)Pages 1222–1226https://doi.org/10.1109/ICMA.2018.8484717The traditional laser coding has its disadvantages of poor accuracy and stability. In this work, a reference clock source that uses the precision timing function of the Global Positioning System (GPS) as a frequency hopping code is designed. A model of ...
- bookOctober 2009
Database System with Efficient Security Enforcement: A Fine-Grained Access Control Approach
Security enforcement is an enabler for databases to meet mandatory regulatory compliance and privacy requirements. A well-rounded yet efficient security mechanism would make a database product eligible for high profile government contracts and new ...
- ArticleMarch 2009
PSALM: Cardinality Estimation in the Presence of Fine-Grained Access Controls
ICDE '09: Proceedings of the 2009 IEEE International Conference on Data EngineeringPages 505–516https://doi.org/10.1109/ICDE.2009.39In database systems that support fine-grained access controls, each user has access rights that determine which tuples are accessible and which are inaccessible. Queries are answered as if the inaccessible tuples are not present in the database. Thus, ...
- ArticleOctober 2008
A Dynamic Congestion Pricing Model Based on SDUO-DT/RC
ICNC '08: Proceedings of the 2008 Fourth International Conference on Natural Computation - Volume 02Pages 231–234https://doi.org/10.1109/ICNC.2008.168Congestion pricing is considered to be one of the best ways to alleviate congestion. A bi-level model based on SDUO-DT/RC (Stochastic Dynamic User Optimal- Departure Time/Route Choice) about the dynamic congestion pricing was established in this paper. ...
- doctoral_thesisJanuary 2008
Query evaluation in the presence of fine-grained access control
Access controls are mechanisms to enhance security by protecting data from unauthorized accesses. In contrast to traditional access controls that grant access rights at the granularity of the whole tables or views, fine-grained access controls specify ...
- articleFebruary 2007
Compact access control labeling for efficient secure XML query evaluation
Data & Knowledge Engineering (DAKE), Volume 60, Issue 2Pages 326–344https://doi.org/10.1016/j.datak.2006.03.005Fine-grained access controls for XML define access privileges at the granularity of individual XML nodes. In this paper, we present a fine-grained access control mechanism for XML data. This mechanism exploits the structural locality of access rights as ...
- ArticleSeptember 2006
Hybrid authorizations and conflict resolution
SDM'06: Proceedings of the Third VLDB international conference on Secure Data ManagementPages 131–145https://doi.org/10.1007/11844662_10Numerous authorization models have been proposed in recent years. While some models support either positive or negative authorizations, hybrid models take advantage of both authorizations simultaneously. However, resolving authorization conflicts is ...
- ArticleApril 2005
Compact Access Control Labeling for Efficient Secure XML Query Evaluation
ICDEW '05: Proceedings of the 21st International Conference on Data Engineering WorkshopsPage 1275https://doi.org/10.1109/ICDE.2005.206Fine-grained access controls for XML define access privileges at the granularity of individual XML nodes. In this paper, we present a fine-grained access control mechanism for XML data. This mechanism exploits the structural locality of access rights as ...
- ArticleMay 2002
Babel: An XML-Based Application Integration Framework
CAiSE '02: Proceedings of the 14th International Conference on Advanced Information Systems EngineeringPages 280–295One of the major problems in integrating independently developed applications is the divergence between the data and control-of-processing models assumed by these applications. Research on database integration has focused on establishing and maintaining ...
- ArticleJuly 2001
Babel: representing business rules in XML for application integration
In this paper, we discuss Babel, a prototype tool for integrating multiple heterogeneous applications, by wrapping them and by specifying the logic of their interoperation in XML.