Search results for "Programming"
showing 10 items of 3090 documents
A novel policy-driven reversible anonymisation scheme for XML-based services
2015
Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…
Ohjelmoinnin opetus Extreme Programming -hengessä
2005
Annales des travaux des auditeurs de l'IHEDN 2007 : "L'énergie au XXIe siècle"
2007
CD rom; International audience
Annales des travaux des auditeurs de l'IHEDN 2008 : "L'espace extra-atmosphérique avenir du XXIe siècle ?"
2008
CD rom; International audience
Fuzzy formalizations of cognitive distance
1992
Spatial training process allows more and more precise informations to be collected and memorized. The aim of this article is to describe a three steps training process based on three fuzzy formalizations of cognitive distance associated to three different types of informations : (1) expression of a linguistic relative distance based on fuzzy relation of closeness or/and remoteness, (2) expression of a linguistic absolute distance expressed by primary linguistic terms like short or long and (3) expression of a fuzzy metric absolute distance. A fourth part is devoted to expression of precise correspondance rule between linguistic and metric opinions described below.
CLEARMiner: a new algorithm for mining association patterns on heterogeneous time series from climate data
2010
International audience; Recently, improvements in sensor technology contributed to increasing in spatial data acquisition. The use of remote sensing in many countries and states, where agricultural business is a large part of their gross income, can provide a valuable source to improve their economy. The combination of climate and remote sensing data can reveal useful information, which can help researchers to monitor and estimate the production of agricultural crops. Data mining techniques are the main tools to analyze and extract relationships and patterns. In this context, this paper presents a new algorithm for mining association patterns in Geo-referenced databases of climate and satel…
Enforcing role based access control model with multimedia signatures.
2009
International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…
Automatic Temporal Formatting of Multimedia Presentations Using Dynamic Petri Nets.
2009
An efficient authoring tool would provide support for automatic temporal formatting and modeling of multimedia presentations. Automatic temporal formatting is a process of converting the given presentation specifications into a required temporal format. This paper presents an algorithm that can convert a temporal layout into a dynamic petri net (DPN )w hich can represent iterative and interactive presentation components effectively. The prototype of the authoring tool extracts the temporal layout from any given SMIL file representation and uses the proposed algorithm to automatically convert it into a DPN. The DPN generated automatically at compile-time helps the run-time components in effe…
Towards a methodology for semantic and context-aware mobile learning
2013
International audience; Internet and mobile devices open the way towards mobile learning (m-learning), offering new opportunities to extend learning beyond the traditional teacher-led classroom. M-learning is not only any form of teaching or studying that takes place when the user interacts with a mobile device. It is more than just using a mobile device to access resources and communicate with others. It should take account of the constant mobile situation of the learner. The challenge here is to exploit this continually changing situation with a system that can dynamically recognize and adapt educational resources and services to the "context" in which the learner operates (localization, …
OPTIMIZATIONS FOR TENSORIAL BERNSTEIN–BASED SOLVERS BY USING POLYHEDRAL BOUNDS
2010
The tensorial Bernstein basis for multivariate polynomials in n variables has a number 3n of functions for degree 2. Consequently, computing the representation of a multivariate polynomial in the tensorial Bernstein basis is an exponential time algorithm, which makes tensorial Bernstein-based solvers impractical for systems with more than n = 6 or 7 variables. This article describes a polytope (Bernstein polytope) with a number of faces, which allows to bound a sparse, multivariate polynomial expressed in the canonical basis by solving several linear programming problems. We compare the performance of a subdivision solver using domain reductions by linear programming with a solver using a c…