Sciweavers

1495 search results - page 211 / 299
» Modeling and controllability for a class of hybrid mechanica...
Sort
View
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 10 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
EMO
2009
Springer
143views Optimization» more  EMO 2009»
13 years 6 months ago
Adapting to the Habitat: On the Integration of Local Search into the Predator-Prey Model
Traditionally, Predator-Prey Models--although providing a more nature-oriented approach to multi-objective optimization than many other standard Evolutionary Multi-Objective Algori...
Christian Grimme, Joachim Lepping, Alexander Papas...
ISCC
2003
IEEE
153views Communications» more  ISCC 2003»
14 years 2 months ago
An Object-Based MPEG-4 Multimedia Content Classification Model for IP QoS Differentiation
In this article, we investigate efficient transmission of Object-based MPEG-4 video over IP networks with QoS management capabilities. MPEG-4 Audio Visual Objects (AVOs) are class...
Toufik Ahmed, Abdelhamid Nafaa, Ahmed Mehaoua
ATS
2010
IEEE
229views Hardware» more  ATS 2010»
13 years 7 months ago
Variation-Aware Fault Modeling
Abstract--To achieve a high product quality for nano-scale systems both realistic defect mechanisms and process variations must be taken into account. While existing approaches for...
Fabian Hopsch, Bernd Becker, Sybille Hellebrand, I...
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu