Sciweavers

762 search results - page 25 / 153
» Modeling and Simulating Information Security Management
Sort
View
MS
2003
13 years 9 months ago
Planetarium Simulation System Usability and Experiments
This paper describes a modeling, simulation, and evaluation system for planetary simulation, including dynamic 3D-visualization, event capturing, and experiment management. Becaus...
Wolfgang P. Kowalk
WSC
1997
13 years 9 months ago
Design and Implementation of HLA Time Management in the RTI Version F.0
The DoD High Level architecture (HLA) has recently become the required method for the interconnection of all DoD computer simulations. The HLA addresses the rules by which simulat...
Christopher D. Carothers, Richard Fujimoto, Richar...
DIM
2008
ACM
13 years 9 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
IFIP12
2009
13 years 5 months ago
Three-Dimension Visualization for Primary Wheat Diseases Based on Simulation Model
Crop simulation model has been becoming the core of agricultural production management and resource optimization management. Displaying crop growth process makes user observe the c...
Shijuan Li, Yeping Zhu
COMPSAC
2006
IEEE
14 years 1 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver