Sciweavers

469 search results - page 19 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
122
Voted
SACMAT
2005
ACM
15 years 8 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
117
Voted
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
15 years 8 months ago
Evolution of Voronoi based fuzzy recurrent controllers
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. Among the most successful methods to auto...
Carlos Kavka, Patricia Roggero, Marc Schoenauer
131
Voted
FIDJI
2004
Springer
15 years 8 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis
131
Voted
PPSN
2004
Springer
15 years 8 months ago
Evolution of Voronoi-Based Fuzzy Controllers
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. One of the most successful methods to auto...
Carlos Kavka, Marc Schoenauer
139
Voted
TPDS
2008
202views more  TPDS 2008»
15 years 2 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...