Sciweavers

922 search results - page 122 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
CCS
2011
ACM
12 years 9 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
WWW
2009
ACM
14 years 10 months ago
An effective semantic search technique using ontology
In this paper, we present a semantic search technique considering the type of desired Web resources and the semantic relationships between the resources and the query keywords in ...
Jihyun Lee, Jun-Ki Min, Chin-Wan Chung
MOBIWAC
2006
ACM
14 years 3 months ago
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This ...
Marc Ciurana, Francisco Barceló, Sebastiano...
GECCO
2010
Springer
141views Optimization» more  GECCO 2010»
14 years 17 days ago
Today/future importance analysis
SBSE techniques have been widely applied to requirements selection and prioritization problems in order to ascertain a suitable set of requirements for the next release of a syste...
Yuanyuan Zhang, Enrique Alba, Juan J. Durillo, Sig...
NOSSDAV
2004
Springer
14 years 2 months ago
Managing a portfolio of overlay paths
In recent years, several architectures have been proposed and developed for supporting streaming applications that take advantage of multiple paths through the network simultaneou...
Daria Antonova, Arvind Krishnamurthy, Zheng Ma, Ra...