نتایج جستجو برای: role model

تعداد نتایج: 3176044  

2008
Maria Luisa Damiani Claudio Silvestri

The objective of spatially-aware access control models is to regulate the access to protected objects based on position information. In that last years, increasing attention has been paid to spatiallyaware access control models for mobile and pervasive applications. Following the experience of design of the GEO-RBAC model, in this paper we want to look at those models with a critical eye and po...

Journal: :Computers in Human Behavior 2015
Zaheer Hussain Glenn A. Williams Mark D. Griffiths

Massively multiplayer online role-playing games (MMORPGs) are a popular form of entertainment used by millions of gamers worldwide. Potential problems relating to MMORPG play have emerged, particularly in relation to being addicted to playing in such virtual environments. In the present study, factors relating to online gaming addiction and motivations for playing in MMORPGs were examined to es...

2003
Cynthia A. Thompson Roger Levy Christopher D. Manning

Determining the semantic role of sentence constituents is a key task in determining sentence meanings lying behind a veneer of variant syntactic expression. We present a model of natural language generation from semantics using the FrameNet semantic role and frame ontology. We train the model using the FrameNet corpus and apply it to the task of automatic semantic role and frame identification,...

2009
Radu CONSTANTINESCU

The paper focuses on role engineering which is an important topic in the development of access control system, particularly when considering Role Based Access Control – RBAC models. Despite the wide use of RBAC in various applications, the role engineering process is not a standardized approach. The paper aims to define a methodology and a process model for role engineering.

2009
Iván V. Meza Sebastian Riedel

In this paper we present a Markov Logic Network for Semantic Role Labelling that jointly performs predicate identification, frame disambiguation, argument identification and argument classification for all predicates in a sentence. Empirically we find that our approach is competitive: our best model would appear on par with the best entry in the CoNLL 2008 shared task open track, and at the 4th...

2009
Meriam Ben-Ghorbel-Talbi Frédéric Cuppens Nora Cuppens-Boulahia Adel Bouhoula

The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the ...

2018
Marco Passarotti Berta González Saavedra

In the context of the Index Thomisticus Treebank project, we have recently enhanced the entire text of Bellum Catilinae by Sallust with a layer of semantic annotation. By exploiting the results of semantic role labeling, ellipsis resolution and coreference analysis, this paper presents a study of the main Actors and Actions (and their relations) in Bellum Catilinae.

2004
Henderik Alex Proper Araminte I. Bleker Stijn Hoppenbrouwers

This paper focuses on the potential role of the Object-Role Modeling (ORM) approach to information modeling for the task of domain modeling. Domain modeling concerns obtaining and modeling the language (concepts, terminologies, ontologies) used by stakeholders to talk about a domain. Achieving conceptual clarity and consensus among stakeholders is an important yet often neglected part of system...

1998
Terry Halpin

Object-Role Modeling (ORM) is a method for modeling and querying an information system at the conceptual level, and mapping between conceptual and logical (e.g. relational) levels. ORM comes in various flavors, including NIAM (Natural language Information Analysis Method). This article provides an overview of ORM, and notes its advantages over Entity Relationship and traditional Object-Oriented...

2016
Prosunjit Biswas Ravi S. Sandhu Ram Krishnan

Many of the advantages of Role Based Access Control (RBAC) accrue from the flexibility of its administrative models. Over the past two decades, several administrative models have been proposed to manage user-role, permission-role and in some cases role-role relations. These models are based on different administrative principles and bring inherent advantages and disadvantages. In this paper, we...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید