Sciweavers

3373 search results - page 520 / 675
» Naturalistic Decision Making
Sort
View
157
Voted
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 6 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
FAST
2007
15 years 6 months ago
Karma: Know-It-All Replacement for a Multilevel Cache
Multilevel caching, common in many storage configurations, introduces new challenges to traditional cache management: data must be kept in the appropriate cache and replication a...
Gala Yadgar, Michael Factor, Assaf Schuster
SERVICES
2010
163views more  SERVICES 2010»
15 years 6 months ago
Ecosystems Monitoring: An Information Extraction and Event Processing Scientific Workflow
This paper presents a novel architecture that brings together Information Extraction (IE) with Event Processing (EP) research areas to globally monitor human activities and biodive...
Ahmed Abdeen Hamed, Byung Suk Lee, Anne E. Thessen
ICINCO
2008
110views Robotics» more  ICINCO 2008»
15 years 6 months ago
Instrumenting Bomb Disposal Suits with Wireless Sensor Networks
Bomb disposal suits contain a large amount of padding and armour to protect the wearer's vital organs in the case of explosion. The combination of the heavy (roughly 40kg) su...
John Kemp, Elena I. Gaura, James Brusey
ICMLA
2008
15 years 6 months ago
Highly Scalable SVM Modeling with Random Granulation for Spam Sender Detection
Spam sender detection based on email subject data is a complex large-scale text mining task. The dataset consists of email subject lines and the corresponding IP address of the em...
Yuchun Tang, Yuanchen He, Sven Krasser