Sciweavers

929 search results - page 159 / 186
» Computer assistance for model definition
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 9 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
TROB
2002
91views more  TROB 2002»
13 years 9 months ago
Time-domain passivity control of haptic interfaces
A patent pending, energy based, method is presented for controlling a haptic interface system to ensure stable contract under a wide variety of operating conditions. System stabil...
Blake Hannaford, Jee-Hwan Ryu
IJWMC
2010
103views more  IJWMC 2010»
13 years 7 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
KDD
2008
ACM
156views Data Mining» more  KDD 2008»
14 years 10 months ago
Can complex network metrics predict the behavior of NBA teams?
The United States National Basketball Association (NBA) is one of the most popular sports league in the world and is well known for moving a millionary betting market that uses th...
Antonio Alfredo Ferreira Loureiro, Pedro O. S. Vaz...
CCS
2007
ACM
14 years 4 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder