• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 3,252
Next 10 →

Table 1 Permissions used in the survey

in RoMEO Studies 3: How academics expect to use open-access research papers
by Elizabeth Gadd, Charles Oppenheim, Steve Probets 2003
Cited by 3

Table 7 Comparison of permission data

in RoMEO Studies 3: How academics expect to use open-access research papers
by Elizabeth Gadd, Charles Oppenheim, Steve Probets 2003
Cited by 3

Table 4 Permission and Obligation in DRTFD*

in An Executable Specification of a Formal Argumentation Protocol
by Alexander Artikis , Marek Sergot , Jeremy Pitt
"... In PAGE 27: ... It is not meaningful to associate obligations with the remaining protocol ac- tions; therefore, we do not need to update the specification of permitted claims, concessions, retractions, denials or objections. Table4 presents the conditions in which a main protocol action is permitted or obligatory. Clearly, different... ..."

Table 7: The permission of reference les

in Decentralized Group Hierarchies in UNIX: An Experiment and Lessons Learned
by Ravi Sandhu, Ravi S, Gail-joon Ahn

Table 1. Key Policy Permissions

in Securing Sensitive Data with the Ingrian DataSecure
by Platform Andrew Koyfman, Andrew Koyfman

Table 2 Permission definition for the example.

in SESAME: Scalable, Environment Sensitive Access Management Engine
by Guangsen Zhang, Manish Parashar

Table 1 Range of permissible transformations

in Graph Isomorphism and Genotypical Houses
by Ruth Conroy Dalton, Ciler Kirsan
"... In PAGE 7: ... This may occasionally occur in particular cases of edge or vertex-edge dyad substitutions. Summary These rules can be summarized in Table1 , where permitted actions are indicated by a tick and excluded actions shown with a cross. Graph Elements Vertex Edge Vertex-Edge Dyad ... ..."

Table 2. Roles and access permissions

in An Access Control Model for Secure Cluster-Computing Environments
by Wei Li, Edward B. Allen

Table 7: Administrative permission for an auditor

in An Administration Concept for the Enterprise Role-Based Access Control Model
by Axel Kern, Andreas Schaad, Jonathan Moffett

Table 1. Local criteria encoding Number Criteria

in Generic Detection of Multi-Part Objects
by Jean-françois Bernier
"... In PAGE 2: ... Hence, conditions are typically very restrictive in the early levels, and more permissive later on. The ten local grouping criteria are listed in Table1 . Each has a simple formal definition.... ..."
Next 10 →
Results 21 - 30 of 3,252
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University