Sciweavers

54 search results - page 3 / 11
» Modeling a Controlled Conveyor Network with Merging Configur...
Sort
View
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 8 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 8 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
NETWORK
2010
119views more  NETWORK 2010»
13 years 2 months ago
A multiple failure propagation model in GMPLS-based networks
In this article, a new model to simulate different failure propagation scenarios in GMPLS-based networks is proposed. Several types of failures and malfunctions may spread along t...
Eusebi Calle, J. Ripoll, J. Segovia, Pere Vil&agra...
POLICY
2005
Springer
14 years 27 days ago
A RBAC-Based Policy Information Base
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based...
Timothy E. Squair, Edgard Jamhour, Ricardo Nabhen
BVAI
2007
Springer
13 years 11 months ago
A Neural Network Model for a View Independent Extraction of Reach-to-Grasp Action Features
Abstract. The aim of this paper is to introduce a novel, biologically inspired approach to extract visual features relevant for controlling and understanding reachto-grasp actions....
Roberto Prevete, Matteo Santoro, Ezio Catanzariti,...