Sciweavers

1995 search results - page 322 / 399
» Belief in Information Flow
Sort
View
CCS
2008
ACM
14 years 2 days ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
CISS
2008
IEEE
14 years 2 days ago
Cross-layer multicommodity capacity expansion on ad hoc wireless networks of cognitive radios
Cognitive radios permit dynamic control of physical layer resources such as transmission power and constellation size; these degrees of freedom can be employed to achieve significa...
Alex Fridman, Steven Weber, Kapil R. Dandekar, Mos...
CVPR
2010
IEEE
14 years 1 days ago
Simultaneous Searching of Globally Optimal Interacting Surfaces with Shape Priors
Multiple surface searching with only image intensity information is a difficult job in the presence of high noise and weak edges. We present in this paper a novel method for global...
Qi Song, Xiaodong Wu, Yunlong Liu, Mona Garvin, Mi...
DEON
2008
Springer
13 years 12 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
EUROSPI
2008
Springer
13 years 12 months ago
Lightweight Process Documentation: Just Enough Structure in Automotive Pre-development
Pre-development in the automotive sector is informally organized to support the engineers trying out new ideas and generally being creative. If feasibility studies reveal system�...
Kai Stapel, Eric Knauss, Christian Allmann