Sciweavers

136 search results - page 8 / 28
» Baaz: A System for Detecting Access Control Misconfiguration...
Sort
View
DEON
2008
Springer
13 years 10 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
SIGOPS
2008
145views more  SIGOPS 2008»
13 years 8 months ago
Towards distributed storage resource management using flow control
Deployment of shared storage systems is increasing with rapid adoption of virtualization technologies to provide isolation, better management and high utilization of resources. Qu...
Ajay Gulati, Irfan Ahmad
SEKE
2007
Springer
14 years 2 months ago
Real-Time Trust Management in Agent Based Online Auction Systems
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...
Rinkesh Patel, Haiping Xu, Ankit Goel
TCSV
2008
120views more  TCSV 2008»
13 years 8 months ago
A Parallel Hardware Architecture for Scale and Rotation Invariant Feature Detection
Abstract--This paper proposes a parallel hardware architecture for image feature detection based on the SIFT (Scale Invariant Feature Transform) algorithm and applied to the SLAM (...
Vanderlei Bonato, Eduardo Marques, George A. Const...
ICC
2007
IEEE
121views Communications» more  ICC 2007»
14 years 3 months ago
A QoS Architecture for IDMA-Based Multi-Service Wireless Networks
— The recent investigations on interleave-division multiple-access (IDMA) have demonstrated its advantage in supporting high-data-rate and multi-rate services over wireless fadin...
Qian Huang, Sammy Chan, King-Tim Ko, Li Ping, Peng...