Sciweavers

701 search results - page 135 / 141
» Comments on
Sort
View
SAC
2008
ACM
13 years 9 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
TROB
2008
228views more  TROB 2008»
13 years 9 months ago
Large-Scale 6-DOF SLAM With Stereo-in-Hand
In this paper, we describe a system that can carry4 out simultaneous localization and mapping (SLAM) in large in-5 door and outdoor environments using a stereo pair moving with 66 ...
Lina María Paz, Pedro Pinies, Juan D. Tard&...
INFSOF
2010
100views more  INFSOF 2010»
13 years 8 months ago
Investigating the impact of a measurement program on software quality
Context: Measurement programs have been around for several decades but have been often misused or misunderstood by managers and developers. This misunderstanding prevented their a...
Houari A. Sahraoui, Lionel C. Briand, Yann-Gaë...
IOR
2010
84views more  IOR 2010»
13 years 8 months ago
Lumpy Capacity Investment and Disinvestment Dynamics
Capacity addition and withdrawal decisions are among the most important strategic decisions made by …rms in oligopolistic industries. In this paper, we develop and analyze a ful...
David Besanko, Ulrich Doraszelski, Lauren Xiaoyuan...
IPL
2010
98views more  IPL 2010»
13 years 8 months ago
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, and the output key-stream is a relatively simple function of the state. In ...
Nathan Keller, Stephen D. Miller