Sciweavers

4890 search results - page 804 / 978
» From system specifications to component behavioral models
Sort
View
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 12 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
BMCBI
2008
153views more  BMCBI 2008»
13 years 10 months ago
Estimating the size of the solution space of metabolic networks
Background: Cellular metabolism is one of the most investigated system of biological interactions. While the topological nature of individual reactions and pathways in the network...
Alfredo Braunstein, Roberto Mulet, Andrea Pagnani
PLDI
2011
ACM
13 years 1 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
CSREASAM
2006
14 years 1 days ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
KI
2007
Springer
14 years 4 months ago
Bridging the Sense-Reasoning Gap Using DyKnow: A Knowledge Processing Middleware Framework
To achieve complex missions an autonomous unmanned aerial vehicle (UAV) operating in dynamic environments must have and maintain situational awareness. This can be achieved by cont...
Fredrik Heintz, Piotr Rudol, Patrick Doherty