Search results for "Programming"

showing 10 items of 3090 documents

A novel policy-driven reversible anonymisation scheme for XML-based services

2015

Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…

XML Encryptioncomputer.internet_protocolComputer sciencePrivacy policyInternet privacyBig dataXACMLprivacyComputer securitycomputer.software_genreXACMLbig dataVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552XML-encryptioncomputer.programming_languagebusiness.industrydeanonymiserService-oriented architectureXML databaseHardware and Architecturebusinessreversible anonymisationcomputerSoftwareXMLInformation SystemsInformation Systems
researchProduct

Ohjelmoinnin opetus Extreme Programming -hengessä

2005

XPohjelmointitietotekniikkaopetusExtreme Programming
researchProduct

Annales des travaux des auditeurs de l'IHEDN 2007 : "L'énergie au XXIe siècle"

2007

CD rom; International audience

XXIe siècleHardware_MEMORYSTRUCTURES[ SHS.HIST ] Humanities and Social Sciences/HistoryAmérique latine[SHS]Humanities and Social SciencesIHEDN[SHS.HIST] Humanities and Social Sciences/History[ SHS ] Humanities and Social Sciences[SHS] Humanities and Social SciencesauditeursHardware_CONTROLSTRUCTURESANDMICROPROGRAMMING[SHS.HIST]Humanities and Social Sciences/HistoryComputingMilieux_MISCELLANEOUSénergie
researchProduct

Annales des travaux des auditeurs de l'IHEDN 2008 : "L'espace extra-atmosphérique avenir du XXIe siècle ?"

2008

CD rom; International audience

XXIe siècleHardware_MEMORYSTRUCTURES[ SHS.HIST ] Humanities and Social Sciences/History[SHS]Humanities and Social Sciencesespace extra-atmosphériqueIHEDN[SHS.HIST] Humanities and Social Sciences/History[ SHS ] Humanities and Social Sciences[SHS] Humanities and Social SciencesauditeursHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGavenir[SHS.HIST]Humanities and Social Sciences/HistoryComputingMilieux_MISCELLANEOUS
researchProduct

Fuzzy formalizations of cognitive distance

1992

Spatial training process allows more and more precise informations to be collected and memorized. The aim of this article is to describe a three steps training process based on three fuzzy formalizations of cognitive distance associated to three different types of informations : (1) expression of a linguistic relative distance based on fuzzy relation of closeness or/and remoteness, (2) expression of a linguistic absolute distance expressed by primary linguistic terms like short or long and (3) expression of a fuzzy metric absolute distance. A fourth part is devoted to expression of precise correspondance rule between linguistic and metric opinions described below.

[ INFO ] Computer Science [cs]ProgrammingPsychologyComputer software[INFO] Computer Science [cs]InformatiqueComputer science
researchProduct

CLEARMiner: a new algorithm for mining association patterns on heterogeneous time series from climate data

2010

International audience; Recently, improvements in sensor technology contributed to increasing in spatial data acquisition. The use of remote sensing in many countries and states, where agricultural business is a large part of their gross income, can provide a valuable source to improve their economy. The combination of climate and remote sensing data can reveal useful information, which can help researchers to monitor and estimate the production of agricultural crops. Data mining techniques are the main tools to analyze and extract relationships and patterns. In this context, this paper presents a new algorithm for mining association patterns in Geo-referenced databases of climate and satel…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR]Association rule learning[INFO.INFO-WB] Computer Science [cs]/WebComputer scienceAssociation (object-oriented programming)[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer scienceContext (language use)computer.software_genreNOAA-AVHRR imagesImage-based Information Systemsassociation rules[SCCO.COMP] Cognitive science/Computer science[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Spatial analysisAgricultural crops[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Series (mathematics)[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM][ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Remote sensing (archaeology)[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Data mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Vegetation IndexAlgorithmcomputer
researchProduct

Enforcing role based access control model with multimedia signatures.

2009

International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer access controlComputer science[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer scienceXACMLAccess control02 engineering and technologycomputer.software_genreWorld Wide Web[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineeringRole-based access control[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Intelligent environmentcomputer.programming_language[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Ambient intelligenceMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Computer security model[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Web servicebusinesscomputerSoftware
researchProduct

Automatic Temporal Formatting of Multimedia Presentations Using Dynamic Petri Nets.

2009

An efficient authoring tool would provide support for automatic temporal formatting and modeling of multimedia presentations. Automatic temporal formatting is a process of converting the given presentation specifications into a required temporal format. This paper presents an algorithm that can convert a temporal layout into a dynamic petri net (DPN )w hich can represent iterative and interactive presentation components effectively. The prototype of the authoring tool extracts the temporal layout from any given SMIL file representation and uses the proposed algorithm to automatically convert it into a DPN. The DPN generated automatically at compile-time helps the run-time components in effe…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer sciencemedia_common.quotation_subject[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genreDisk formattingPresentation[SCCO.COMP] Cognitive science/Computer scienceFormal specificationSynchronization (computer science)0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Representation (mathematics)ComputingMilieux_MISCELLANEOUSmedia_common[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]MultimediaProgramming language[INFO.INFO-WB]Computer Science [cs]/WebProcess (computing)[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]020207 software engineeringPetri net[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computer
researchProduct

Towards a methodology for semantic and context-aware mobile learning

2013

International audience; Internet and mobile devices open the way towards mobile learning (m-learning), offering new opportunities to extend learning beyond the traditional teacher-led classroom. M-learning is not only any form of teaching or studying that takes place when the user interacts with a mobile device. It is more than just using a mobile device to access resources and communicate with others. It should take account of the constant mobile situation of the learner. The challenge here is to exploit this continually changing situation with a system that can dynamically recognize and adapt educational resources and services to the "context" in which the learner operates (localization, …

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebExploitComputer science[ INFO.INFO-IU ] Computer Science [cs]/Ubiquitous Computing[ INFO.INFO-WB ] Computer Science [cs]/WebContext (language use)02 engineering and technologycontextWorld Wide Webmobile learning[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MC]Computer Science [cs]/Mobile ComputingConstant (computer programming)semantic web[INFO.INFO-MC] Computer Science [cs]/Mobile Computing[ INFO.INFO-MC ] Computer Science [cs]/Mobile Computing0202 electrical engineering electronic engineering information engineeringMobile searchSemantic Webbusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing020206 networking & telecommunicationsOpen learning[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]The Internet[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]businessMobile device
researchProduct

OPTIMIZATIONS FOR TENSORIAL BERNSTEIN–BASED SOLVERS BY USING POLYHEDRAL BOUNDS

2010

The tensorial Bernstein basis for multivariate polynomials in n variables has a number 3n of functions for degree 2. Consequently, computing the representation of a multivariate polynomial in the tensorial Bernstein basis is an exponential time algorithm, which makes tensorial Bernstein-based solvers impractical for systems with more than n = 6 or 7 variables. This article describes a polytope (Bernstein polytope) with a number of faces, which allows to bound a sparse, multivariate polynomial expressed in the canonical basis by solving several linear programming problems. We compare the performance of a subdivision solver using domain reductions by linear programming with a solver using a c…

[ INFO.INFO-NA ] Computer Science [cs]/Numerical Analysis [cs.NA]Linear programmingPolytopeBernstein polynomials01 natural sciencesSimplex algorithmApplied mathematicssimplex algorithm0101 mathematicsMathematicsDiscrete mathematicsBasis (linear algebra)Applied Mathematics010102 general mathematicssubdivision solverlinear programmingalgebraic systemsQuadratic function[INFO.INFO-NA]Computer Science [cs]/Numerical Analysis [cs.NA]Solver1991 Mathematics Subject Classification: 14Q15 14Q20 65G40Bernstein polynomialComputer Science Applications010101 applied mathematicsModeling and SimulationStandard basisGeometry and TopologyComputer Vision and Pattern RecognitionSoftwareInternational Journal of Shape Modeling
researchProduct