Sciweavers

8658 search results - page 1539 / 1732
» Models of Command and Control
Sort
View
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
14 years 1 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
ACAL
2009
Springer
14 years 1 months ago
An Empirical Exploration of a Definition of Creative Novelty for Generative Art
Abstract. We explore a new definition of creativity -- one which emphasizes the statistical capacity of a system to generate previously unseen patterns -- and discuss motivations f...
Taras Kowaliw, Alan Dorin, Jon McCormack
COLCOM
2007
IEEE
14 years 1 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
CONEXT
2007
ACM
14 years 1 months ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
COMPLEX
2009
Springer
14 years 1 months ago
Using the Weighted Rich-Club Coefficient to Explore Traffic Organization in Mobility Networks
Abstract. The aim of a transportation system is to enable the movement of goods or persons between any two locations with the highest possible efficiency. This simple principle ins...
Jose J. Ramasco, Vittoria Colizza, Pietro Panzaras...
« Prev « First page 1539 / 1732 Last » Next »