Sciweavers

26071 search results - page 5122 / 5215
» Making the
Sort
View
TIFS
2010
130views more  TIFS 2010»
13 years 4 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
TIM
2010
168views Education» more  TIM 2010»
13 years 4 months ago
Thermal Event Recognition Applied to Protection of Tokamak Plasma-Facing Components
Magnetic confinement fusion tokamaks are complex devices where a large amount of power is required to make the fusion reactions happen. In such experimental conditions, Plasma Faci...
Vincent Martin, Jean-Marcel Travere, Franço...
TIP
2010
182views more  TIP 2010»
13 years 4 months ago
Flexible Manifold Embedding: A Framework for Semi-Supervised and Unsupervised Dimension Reduction
We propose a unified manifold learning framework for semi-supervised and unsupervised dimension reduction by employing a simple but effective linear regression function to map the ...
Feiping Nie, Dong Xu, Ivor Wai-Hung Tsang, Changsh...
TISSEC
2010
142views more  TISSEC 2010»
13 years 4 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
TITB
2010
83views Education» more  TITB 2010»
13 years 4 months ago
Universal glucose models for predicting subcutaneous glucose concentration in humans
This paper tests the hypothesis that a "universal," data-driven model can be developed based on glucose data from one diabetic subject, and subsequently applied to predic...
Adiwinata Gani, Andrei V. Gribok, Yinghui Lu, W. K...
« Prev « First page 5122 / 5215 Last » Next »