Sciweavers

230 search results - page 21 / 46
» Exploring reactive access control
Sort
View
CAISE
2004
Springer
14 years 4 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
CONTEXT
2005
Springer
14 years 4 months ago
Context-Dependent and Epistemic Uses of Attention for Perceptual-Demonstrative Identification
Object identification via a perceptual-demonstrative mode of presentation has been studied in cognitive science as a particularly direct and context-dependent means of identifying ...
Nicolas J. Bullot
PPOPP
2005
ACM
14 years 4 months ago
Exposing disk layout to compiler for reducing energy consumption of parallel disk based systems
Disk subsystem is known to be a major contributor to overall power consumption of high-end parallel systems. Past research proposed several architectural level techniques to reduc...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir, A...
CF
2005
ACM
14 years 27 days ago
Controlling leakage power with the replacement policy in slumberous caches
As technology scales down at an exponential rate, leakage power is fast becoming the dominant component of the total power budget. A large share of the total leakage power is diss...
Nasir Mohyuddin, Rashed Bhatti, Michel Dubois
ICRA
2010
IEEE
159views Robotics» more  ICRA 2010»
13 years 9 months ago
Navigation and control of the Nereus hybrid underwater vehicle for global ocean science to 10, 903 m depth: Preliminary results
— This paper reports an overview of the navigation and control system design for the new Nereus hybrid underwater robotic vehicle (HROV). Vehicle performance during its first se...
Louis L. Whitcomb, Michael V. Jakuba, James C. Kin...