Sciweavers

4890 search results - page 68 / 978
» From system specifications to component behavioral models
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
156
Voted
CIA
2007
Springer
15 years 10 months ago
From Local Search to Global Behavior: Ad Hoc Network Example
We introduce the Consensual N-Player Prisoner’s Dilemma as a large-scale dilemma. We then present a framework for cooperative consensus formation in large-scale MAS under the N-P...
Osher Yadgar
140
Voted
EDOC
2006
IEEE
15 years 8 months ago
Integrated Configuration of Enterprise Systems for Interoperability -- Towards Process Model and Business Document Specification
Enterprise Systems (ES) can be understood as the de facto standard for holistic operational and managerial support within an organization. Most commonly ES are offered as commerci...
Christian Janiesch, Alexander Dreiling, Ulrike Gre...
135
Voted
JCP
2007
117views more  JCP 2007»
15 years 4 months ago
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...
CDC
2010
IEEE
186views Control Systems» more  CDC 2010»
14 years 11 months ago
Approximation and limiting behavior of random models
In this paper, we investigate limiting behavior of linear dynamic systems driven by random stochastic matrices. We introduce and study the new concepts of partial ergodicity and 1-...
Behrouz Touri, Angelia Nedic