Sciweavers

739 search results - page 76 / 148
» Information Flow in Credential Systems
Sort
View
IJMI
2006
73views more  IJMI 2006»
13 years 7 months ago
Six methodological steps to build medical data warehouses for research
In this paper we describe a methodology that emerged during a healthcare project, which consisted among others in grouping information from heterogeneous and distributed informati...
Nicolae B. Szirbik, C. Pelletier, Thierry J. Chaus...
CDC
2010
IEEE
126views Control Systems» more  CDC 2010»
13 years 2 months ago
Cooperative control of networked nonlinear systems
In this paper, network-based cooperative control of nonlinear dynamical systems is investigated. A theorem on cooperative stability is presented for designing nonlinear consensus a...
Zhihua Qu
KES
1998
Springer
13 years 12 months ago
Attractor systems and analog computation
Attractor systems are useful in neurodynamics,mainly in the modelingof associative memory. Thispaper presentsa complexity theory for continuous phase space dynamical systems with ...
Hava T. Siegelmann, Shmuel Fishman
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 9 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
HOTOS
1999
IEEE
14 years 2 days ago
An End-System Architecture for Unified Congestion Management
In this position paper we motivate and describe the Congestion Manager (CM), a novel end-system architecture, which enables application adaptation to network congestion. The CM ma...
Hariharan Shankar Rahul, Hari Balakrishnan, Sriniv...