Sciweavers

214 search results - page 14 / 43
» Neuro-fuzzy control based on the NEFCON-model: recent develo...
Sort
View
CISS
2010
IEEE
13 years 3 days ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
13 years 9 months ago
Automatic circle detection on images with an adaptive bacterial foraging algorithm
This article presents an algorithm for the automatic detection of circular shapes from complicated and noisy images. The algorithm is based on a recently developed swarm-intellige...
Sambarta Dasgupta, Arijit Biswas, Swagatam Das, Aj...
DBSEC
2001
129views Database» more  DBSEC 2001»
13 years 9 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
CSREAPSC
2006
13 years 10 months ago
Design and Implementation of SONICA (Service Oriented Network Interoperability for Component Adaptation) for Multimedia Pervasiv
Abstract - Recent advances in multimedia network systems have led to the development of a new generation of applications that associate the use of various multimedia objects. The c...
Hiroshi Hayakawa, Takahiro Koita, Kenya Sato
CIKM
2005
Springer
14 years 2 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar