Sciweavers

497 search results - page 55 / 100
» A knowledgeable security model for distributed health inform...
Sort
View
COMPSAC
2008
IEEE
14 years 3 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
14 years 1 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
AAAI
2011
12 years 8 months ago
Modeling and Monitoring Crop Disease in Developing Countries
Information about the spread of crop disease is vital in developing countries, and as a result the governments of such countries devote scarce resources to gathering such data. Un...
John Alexander Quinn, Kevin Leyton-Brown, Ernest M...
HICSS
1996
IEEE
105views Biometrics» more  HICSS 1996»
14 years 1 months ago
DEVS-C++: A High Performance Modelling and Simulation Environment
Simulation of landscape ecosystems with high realism demands computing power greatly exceeding that of current workstation technology. However, the prospects are excellent that mo...
Bernard P. Zeigler, Yoonkeon Moon, Doohwan Kim, Je...