Sciweavers

2889 search results - page 500 / 578
» A Case Study in the Design of a Restaurant Management System
Sort
View
CCS
2010
ACM
14 years 3 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
INFOCOM
2003
IEEE
14 years 2 months ago
Goodput Analysis of a Fluid Queue with Selective Discarding and a Responsive Bursty Source
Abstract— In this paper we analyse a feedback system consisting of a finite buffer fluid queue and a responsive source. The source alternates between silence periods and active...
Parijat Dube, Eitan Altman
DEON
2010
Springer
14 years 1 months ago
Value-Based Argumentation for Justifying Compliance
Compliance is often achieved ‘by design’ through a coherent system of controls consisting of information systems and procedures . This system-based control requires a new appro...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
ALGOSENSORS
2007
Springer
13 years 10 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
WSCG
2001
137views more  WSCG 2001»
13 years 10 months ago
An Application of Combined Neural Networks to Remotely Sensed Images
Studies in the area of Pattern Recognition have indicated that in most cases a classifier performs differently from one pattern class to another. This observation gave birth to th...
Rafael Valle dos Santos, Marley B. R. Vellasco, Ra...