Sciweavers

1316 search results - page 45 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
AUTOMATICA
2010
99views more  AUTOMATICA 2010»
13 years 9 months ago
Continuous trajectory planning of mobile sensors for informative forecasting
This paper addresses planning of continuous paths for mobile sensors to reduce uncertainty in some quantities of interest in the future. The mutual information between the measure...
Han-Lim Choi, Jonathan P. How
DCOSS
2005
Springer
14 years 2 months ago
Collaborative Sensing Using Sensors of Uncoordinated Mobility
Abstract— Wireless sensor networks are useful for monitoring physical parameters and detecting objects or substances in an area. Most ongoing research consider the use of either ...
Kuang-Ching Wang, Parmesh Ramanathan
CAISE
1993
Springer
14 years 1 months ago
Similarity for Analogical Software Reuse: A Conceptual Modelling Approach
We present our approach to defining similarity between software artifacts and discuss its potential exploitation in software reuse by analogy. We first establish properties of si...
George Spanoudakis, Panos Constantopoulos
TISSEC
2010
121views more  TISSEC 2010»
13 years 7 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
CSE
2009
IEEE
14 years 4 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu