Sciweavers

670 search results - page 67 / 134
» A RBAC-Based Policy Information Base
Sort
View
DKE
2000
102views more  DKE 2000»
13 years 10 months ago
A Generic Framework for the Modeling of Contexts and its Applications
: Large information bases that are used by several different users and applications accommodate the demands of their users more effectively, if they can be split into possibly over...
Renate Motschnig-Pitrik
DIMVA
2007
14 years 2 days ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
CORR
2011
Springer
209views Education» more  CORR 2011»
13 years 2 months ago
Close the Gaps: A Learning-while-Doing Algorithm for a Class of Single-Product Revenue Management Problems
In this work, we consider a retailer selling a single product with limited on-hand inventory over a finite selling season. Customer demand arrives according to a Poisson process,...
Zizhuo Wang, Shiming Deng, Yinyu Ye
CISS
2010
IEEE
13 years 2 months ago
The maximum stable broadcast throughput for wireless line networks with network coding and topology control
—We consider broadcasting from a single source to multiple destinations in a linear wireless erasure network with feedback. The problem is to find the maximum stable throughput ...
Ka-Hung Hui, Yalin Evren Sagduyu, Dongning Guo, Ra...
IEEEIAS
2008
IEEE
14 years 5 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan