Sciweavers

499 search results - page 45 / 100
» An Integrated Model for Access Control and Information Flow ...
Sort
View
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
14 years 18 days ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
DISCEX
2003
IEEE
14 years 29 days ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
JIB
2007
95views more  JIB 2007»
13 years 7 months ago
Integration of constraints documented in SBML, SBO, and the SBML Manual facilitates validation of biological models
The creation of quantitative, simulatable, Systems Biology Markup Language (SBML) models that accurately simulate the system under study is a time-intensive manual process that re...
Allyson L. Lister, Matthew R. Pocock, Anil Wipat
DATE
2004
IEEE
143views Hardware» more  DATE 2004»
13 years 11 months ago
Fault-Tolerant Deployment of Embedded Software for Cost-Sensitive Real-Time Feedback-Control Applications
Designing cost-sensitive real-time control systems for safetycritical applications requires a careful analysis of the cost/coverage trade-offs of fault-tolerant solutions. This fu...
Claudio Pinello, Luca P. Carloni, Alberto L. Sangi...
DAC
2007
ACM
14 years 8 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...