Sciweavers

10604 search results - page 2058 / 2121
» Computational Fluid Dynamics
Sort
View
MMMACNS
2005
Springer
14 years 2 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
PKDD
2005
Springer
123views Data Mining» more  PKDD 2005»
14 years 2 months ago
A Multi-metric Index for Euclidean and Periodic Matching
In many classification and data-mining applications the user does not know a priori which distance measure is the most appropriate for the task at hand without examining the produ...
Michail Vlachos, Zografoula Vagena, Vittorio Caste...
POLICY
2005
Springer
14 years 2 months ago
Policy Conflict Analysis for Quality of Service Management
Policy-based management provides the ability to (re-)configure differentiated services networks so that desired Quality of Service (QoS) goals are achieved. Relevant configuration...
Marinos Charalambides, Paris Flegkas, George Pavlo...
RAID
2005
Springer
14 years 2 months ago
Virtual Playgrounds for Worm Behavior Investigation
To detect and defend against Internet worms, researchers have long hoped to have a safe convenient environment to unleash and run real-world worms for close observation of their in...
Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H....
TGC
2005
Springer
14 years 2 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
« Prev « First page 2058 / 2121 Last » Next »