نتایج جستجو برای: role
تعداد نتایج: 1251012 فیلتر نتایج به سال:
In role-based access control (RBAC) permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. The principal motivation behind RBAC is to simplify administration. An appealing possibility is to use RBAC itself to manage RBAC, to further provide administrative convenience. In this paper we introduce a role-based administrative...
We present a temporal object model capable of representing object lifespans and also the history of their roles and associations. We adopt an approach of temporal generalisation rather than temporal extension in which a model in its entirety is given a temporal semantics through an orthogonal generalisation of all model concepts { including the lifespan of object roles themselves and constraint...
The RBC collaboration has performed simulations with domain wall fermions (DWF) and the DBW2 gauge action and presented results for weak matrix elements. This report focuses on the chiral condensate 〈ψ̄ψ〉 and exploits nonperturbative renormalization calculations to get physical values for both quenched and dynamical fermions. The simulation details are given the Table 1. Two lattice volumes are ...
In this paper, we show how to model UNIX file access using a rolebased approach. A role-based access control model is presented, and its use in reflecting the existing permissions in a UNIX environment is described.
Past work on emotion processing has focused solely on detecting emotions, and ignored questions such as ‘who is feeling the emotion (the experiencer)?’ and ‘towards whom is the emotion directed (the stimulus)?’. We automatically compile a large dataset of tweets pertaining to the 2012 US presidential elections, and annotate it not only for emotion but also for the experiencer and the stimulus. ...
We explore the extent to which highresource manual annotations such as treebanks are necessary for the task of semantic role labeling (SRL). We examine how performance changes without syntactic supervision, comparing both joint and pipelined methods to induce latent syntax. This work highlights a new application of unsupervised grammar induction and demonstrates several approaches to SRL in the...
I show how to construct a stochastic long-lived overlapping generations model, based on a non-stochastic model developed by Olivier Blanchard [2] and Philippe Weil [14], that nests the RBC model as a special case. My innovation over previous work is to add an aggregate stochastic shock. I provide three different calibrations of the model. One mimics the RBC model and the other two are heterogen...
The requirements for routing architectures described in this document were produced by two sub-groups under the IRTF Routing Research Group (RRG) in 2001, with some editorial updates up to 2006. The two subgroups worked independently, and the resulting requirements represent two separate views of the problem and of what is required to fix the problem. This document may usefully serve as part of...
American and European Legislation for protection of medical data agree that the patient has the right to play a pivotal role in the decisions regarding the content and distribution of her/his medical records. The Role Based Access Control (RBAC) model is the most commonly used authorization model in healthcare. The first goal of this work is to review if existing models and standards provide fo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید