Sciweavers

804 search results - page 84 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
FGCS
2007
89views more  FGCS 2007»
15 years 4 months ago
Federated grid clusters using service address routed optical networks
Clusters of computers have emerged as cost-effective parallel and/or distributed computing systems for computationally intensive tasks. Normally, clusters are composed of high per...
Isaac D. Scherson, Daniel S. Valencia, Enrique Cau...
TWC
2008
227views more  TWC 2008»
15 years 4 months ago
Cross-layer optimization frameworks for multihop wireless networks using cooperative diversity
We propose cross-layer optimization frameworks for multihop wireless networks using cooperative diversity. These frameworks provide solutions to fundamental relaying problems of de...
Long Le, Ekram Hossain
AH
2008
Springer
15 years 11 months ago
Do Students Trust Their Open Learner Models?
Open learner models (OLM) enable users to access their learner model to view information about their understanding. Opening the learner model to the learner may increase their perc...
Norasnita Ahmad, Susan Bull
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
15 years 10 months ago
Virtual Organizations as Normative Multiagent Systems
In this paper we propose a conceptual model of virtual organizations as normative multiagent systems. The dynamic aspects of virtual organizations are modeled using aspects of spe...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
CAISE
2004
Springer
15 years 10 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau