Sciweavers

427 search results - page 41 / 86
» Policies: Giving Users Control over Calls
Sort
View
NDSS
2009
IEEE
14 years 4 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
WSC
2000
13 years 11 months ago
Developing a national allocation model for cadaveric kidneys
The UNOS Kidney Allocation Model (UKAM) is a software tool for the simulation and analysis of national cadaveric kidney and kidney-pancreas allocation policies for transplantation...
Sarah E. Taranto, Ann M. Harper, Erick B. Edwards,...
AUSFORENSICS
2003
13 years 11 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
NIPS
2007
13 years 11 months ago
Hierarchical Apprenticeship Learning with Application to Quadruped Locomotion
We consider apprenticeship learning—learning from expert demonstrations—in the setting of large, complex domains. Past work in apprenticeship learning requires that the expert...
J. Zico Kolter, Pieter Abbeel, Andrew Y. Ng
COMPSAC
2002
IEEE
14 years 2 months ago
Personalized Redirection of Communication
Universal access to information and data is an important goal of current research. Previously different forms of information and data, captured by different devices or held on dif...
Yuping Yang, M. Howard Williams