Sciweavers

1495 search results - page 209 / 299
» Modeling and controllability for a class of hybrid mechanica...
Sort
View
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
14 years 3 months ago
Granularity Conscious Modeling for Probabilistic Databases
The convergence of embedded sensor systems and stream query processing suggests an important role for database techniques, in managing data that only partially – and often inacc...
Eirinaios Michelakis, Daisy Zhe Wang, Minos N. Gar...
CISS
2008
IEEE
14 years 3 months ago
Channel modeling and detector design for dynamic mode high density probe storage
— Probe based data storage is a promising solution for satisfying the demand for ultra-high capacity storage devices. One of the main problems with probe storage devices is the w...
Naveen Kumar, Pranav Agarwal, Aditya Ramamoorthy, ...
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 9 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
SBP
2012
Springer
12 years 4 months ago
Creating Interaction Environments: Defining a Two-Sided Market Model of the Development and Dominance of Platforms
Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 10 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...