Sciweavers

872 search results - page 51 / 175
» An Access Control Language for a General Provenance Model
Sort
View
127
Voted
CSFW
1994
IEEE
15 years 8 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
ESORICS
2006
Springer
15 years 8 months ago
Discretionary Capability Confinement
Motivated by the need of application-level access control in dynamically extensible systems, this work proposes a static annotation system for modeling capabilies in a Java-like pr...
Philip W. L. Fong
158
Voted
ICANNGA
2009
Springer
212views Algorithms» more  ICANNGA 2009»
15 years 10 months ago
Evolutionary Regression Modeling with Active Learning: An Application to Rainfall Runoff Modeling
Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a feasible alte...
Ivo Couckuyt, Dirk Gorissen, Hamed Rouhani, Eric L...
CSL
2006
Springer
15 years 4 months ago
Support vector machines for speaker and language recognition
Support vector machines (SVMs) have proven to be a powerful technique for pattern classification. SVMs map inputs into a high dimensional space and then separate classes with a hy...
William M. Campbell, Joseph P. Campbell, Douglas A...
ASPLOS
2006
ACM
15 years 10 months ago
Portability events: a programming model for scalable system infrastructures
Clustered Objects (COs) [1] have been proven to be an effective ion for improving scalability of systems software [2, 3]. But can we devise a programming model that would allow CO...
Chris Matthews, Yvonne Coady, Jonathan Appavoo