Sciweavers

230 search results - page 21 / 46
» Exploring reactive access control
Sort
View
82
Voted
CAISE
2004
Springer
15 years 8 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
130
Voted
CONTEXT
2005
Springer
15 years 8 months ago
Context-Dependent and Epistemic Uses of Attention for Perceptual-Demonstrative Identification
Object identification via a perceptual-demonstrative mode of presentation has been studied in cognitive science as a particularly direct and context-dependent means of identifying ...
Nicolas J. Bullot
143
Voted
PPOPP
2005
ACM
15 years 8 months ago
Exposing disk layout to compiler for reducing energy consumption of parallel disk based systems
Disk subsystem is known to be a major contributor to overall power consumption of high-end parallel systems. Past research proposed several architectural level techniques to reduc...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir, A...
141
Voted
CF
2005
ACM
15 years 4 months ago
Controlling leakage power with the replacement policy in slumberous caches
As technology scales down at an exponential rate, leakage power is fast becoming the dominant component of the total power budget. A large share of the total leakage power is diss...
Nasir Mohyuddin, Rashed Bhatti, Michel Dubois
112
Voted
ICRA
2010
IEEE
159views Robotics» more  ICRA 2010»
15 years 1 months ago
Navigation and control of the Nereus hybrid underwater vehicle for global ocean science to 10, 903 m depth: Preliminary results
— This paper reports an overview of the navigation and control system design for the new Nereus hybrid underwater robotic vehicle (HROV). Vehicle performance during its first se...
Louis L. Whitcomb, Michael V. Jakuba, James C. Kin...