Sciweavers

327 search results - page 28 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
VIZSEC
2007
Springer
14 years 3 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
CASCON
2006
131views Education» more  CASCON 2006»
13 years 10 months ago
STAC: software tuning panels for autonomic control
One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
Elizabeth Dancy, James R. Cordy
COMPUTER
2004
100views more  COMPUTER 2004»
13 years 9 months ago
Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure
any benefits. Most significantly, an abstract architectural model can provide a global perspective of the system and expose important system-level properties and integrity constrai...
David Garlan, Shang-Wen Cheng, An-Cheng Huang, Bra...
CONTEXT
2005
Springer
14 years 2 months ago
Context-Dependent and Epistemic Uses of Attention for Perceptual-Demonstrative Identification
Object identification via a perceptual-demonstrative mode of presentation has been studied in cognitive science as a particularly direct and context-dependent means of identifying ...
Nicolas J. Bullot
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 4 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad