Sciweavers

2270 search results - page 271 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
WSC
1998
15 years 6 months ago
Implementations of Dispatch Rules in Parallel Manufacturing Simulation
Most features in commercial simulation packages are often omitted in parallel simulation benchmarks, because they neither affect the overall correctness of the simulation protocol...
Chu-Cheow Lim, Yoke-Hean Low, Boon-Ping Gan, Sanja...
149
Voted
SACMAT
2004
ACM
15 years 10 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
IUI
2009
ACM
16 years 1 months ago
Rich interfaces for reading news on the web
Using content-specific models to guide information retrieval and extraction can provide richer interfaces to endusers for both understanding the context of news events and navigat...
Earl J. Wagner, Jiahui Liu, Larry Birnbaum, Kennet...
HICSS
2005
IEEE
116views Biometrics» more  HICSS 2005»
15 years 10 months ago
Why Does State Government Contract Out Their E-Government Services?
Contracting out government services, especially IT services, has accelerated in recent years in the United States. Based on literature in privatization and contracting out, the au...
Anna Ya Ni, Stuart Bretschneider
MICAI
2005
Springer
15 years 10 months ago
Knowledge and Reasoning Supported by Cognitive Maps
A powerful and useful approach for modeling knowledge and qualitative reasoning is the Cognitive Map. The background of Cognitive Maps is the research about learning environments c...
Alejandro Peña Ayala, Humberto Sossa, Agust...