Sciweavers

2486 search results - page 112 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
TFS
2008
174views more  TFS 2008»
13 years 8 months ago
Type-2 Fuzzy Markov Random Fields and Their Application to Handwritten Chinese Character Recognition
In this paper, we integrate type-2 (T2) fuzzy sets with Markov random fields (MRFs) referred to as T2 FMRFs, which may handle both fuzziness and randomness in the structural patter...
Jia Zeng, Zhi-Qiang Liu
WIOPT
2010
IEEE
13 years 6 months ago
Delay efficient scheduling via redundant constraints in multihop networks
Abstract--We consider the problem of delay-efficient scheduling in general multihop networks. While the class of max-weight type algorithms are known to be throughput optimal for t...
Longbo Huang, Michael J. Neely
ICISS
2007
Springer
14 years 3 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
JDCTA
2008
74views more  JDCTA 2008»
13 years 8 months ago
Processing Logical Access Control Command in Computer System
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-...
CAISE
1999
Springer
14 years 1 months ago
Applying Graph Reduction Techniques for Identifying Structural Conflicts in Process Models
Abstract. The foundation of a process model lies in its control flow specifications. Using a generic process modeling language for workflows, we show how a control flow specificati...
Wasim Sadiq, Maria E. Orlowska