Sciweavers

2270 search results - page 315 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
SDB
1995
95views Database» more  SDB 1995»
15 years 8 months ago
Semantics of Database Transformations
Database transformations arise in many di erent settings including database integration, evolution of database systems, and implementing user views and data-entry tools. This paper...
Peter Buneman, Susan B. Davidson, Anthony Kosky
EOR
2008
116views more  EOR 2008»
15 years 4 months ago
A hybrid neuro-fuzzy analytical approach to mode choice of global logistics management
This paper presents a hybrid neuro-fuzzy methodology to identify appropriate global logistics (GL) operational modes used for global supply chain management. The proposed methodol...
Jiuh-Biing Sheu
CCR
2007
69views more  CCR 2007»
15 years 4 months ago
The state of peer-to-peer simulators and simulations
In this paper, we discuss the current situation with respect to simulation usage in P2P research, testing the available P2P simulators against a proposed set of requirements, and ...
S. Naicken, B. Livingston, Anirban Basu, S. Rodhet...
CSL
2002
Springer
15 years 4 months ago
Weighted finite-state transducers in speech recognition
We survey the use of weighted finite-state transducers (WFSTs) in speech recognition. We show that WFSTs provide a common and natural representation for HMM models, context-depend...
Mehryar Mohri, Fernando Pereira, Michael Riley
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
15 years 11 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...