Sciweavers

29172 search results - page 29 / 5835
» Modeling Systems in CLP
Sort
View
CSFW
2012
IEEE
11 years 11 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
GECCO
2011
Springer
236views Optimization» more  GECCO 2011»
13 years 6 days ago
Online, GA based mixture of experts: a probabilistic model of ucs
In recent years there have been efforts to develop a probabilistic framework to explain the workings of a Learning Classifier System. This direction of research has met with lim...
Narayanan Unny Edakunni, Gavin Brown, Tim Kovacs
SJ
2011
13 years 3 months ago
Heuristics for Systems Engineering Cost Estimation
Abstract—Engineering cannot wait until all phenomena are explained. Engineers may work effectively, often for centuries, with heuristics. This paper provides thirty one heuristic...
Ricardo Valerdi
IEEESP
2011
13 years 5 days ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
13 years 3 months ago
Semiparametric identification of Hammerstein systems using input reconstruction and a single harmonic input
We present a two-step method for identifying SISO Hammerstein systems. First, using a persistent input with retrospective cost optimization, we estimate a parametric model of the l...
Anthony M. D'Amato, Kenny S. Mitchell, Bruno Ot&aa...