Sciweavers

164 search results - page 2 / 33
» Intelligent High-Security Access Control
Sort
View
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
14 years 15 days ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
ICAI
2009
13 years 5 months ago
Autonomic Self-Healing for MANETs
Junaid Ahsenali Chaudhry, Yonghwan Lee, Ken R. Pen...
AIMSA
2008
Springer
14 years 1 months ago
A Logical Approach to Dynamic Role-Based Access Control
Since its formalization RBAC has become the yardstick for the evaluation of access control formalisms. In order to meet organizational needs, it has been extended along several di...
Philippe Balbiani, Yannick Chevalier, Marwa El Hou...
INFOCOM
2010
IEEE
13 years 6 months ago
Distributed Power Control for Cognitive User Access based on Primary Link Control Feedback
—We venture beyond the “listen-before-talk” strategy that is common in many traditional cognitive radio access schemes. We exploit the bi-directional nature of most primary c...
Senhua Huang, Xin Liu, Zhi Ding
EMSOFT
2007
Springer
13 years 11 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux