Sciweavers

209 search results - page 27 / 42
» Exploiting Information Relationships for Access Control
Sort
View
DCOSS
2009
Springer
14 years 5 months ago
Combining Positioning and Communication Using UWB Transceivers
A new generation of ultra wideband (UWB) communication transceivers are becoming available which support both positioning and communication tasks. Transceiver manufacturers envisio...
Paul Alcock, Utz Roedig, Mike Hazas
ENTCS
2007
112views more  ENTCS 2007»
13 years 10 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
ISMAR
2005
IEEE
14 years 4 months ago
Localisation and Interaction for Augmented Maps
Paper-based cartographic maps provide highly detailed information visualisation with unrivalled fidelity and information density. Moreover, the physical properties of paper affor...
Gerhard Reitmayr, Ethan Eade, Tom Drummond
ATAL
2008
Springer
14 years 24 days ago
Autonomous transfer for reinforcement learning
Recent work in transfer learning has succeeded in making reinforcement learning algorithms more efficient by incorporating knowledge from previous tasks. However, such methods typ...
Matthew E. Taylor, Gregory Kuhlmann, Peter Stone
CCS
2008
ACM
14 years 24 days ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...