Sciweavers

922 search results - page 122 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
165
Voted
CCS
2011
ACM
14 years 3 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
89
Voted
WWW
2009
ACM
16 years 4 months ago
An effective semantic search technique using ontology
In this paper, we present a semantic search technique considering the type of desired Web resources and the semantic relationships between the resources and the query keywords in ...
Jihyun Lee, Jun-Ki Min, Chin-Wan Chung
150
Voted
MOBIWAC
2006
ACM
15 years 9 months ago
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This ...
Marc Ciurana, Francisco Barceló, Sebastiano...
113
Voted
GECCO
2010
Springer
141views Optimization» more  GECCO 2010»
15 years 7 months ago
Today/future importance analysis
SBSE techniques have been widely applied to requirements selection and prioritization problems in order to ascertain a suitable set of requirements for the next release of a syste...
Yuanyuan Zhang, Enrique Alba, Juan J. Durillo, Sig...
109
Voted
NOSSDAV
2004
Springer
15 years 9 months ago
Managing a portfolio of overlay paths
In recent years, several architectures have been proposed and developed for supporting streaming applications that take advantage of multiple paths through the network simultaneou...
Daria Antonova, Arvind Krishnamurthy, Zheng Ma, Ra...