Sciweavers

379 search results - page 7 / 76
» Processing Logical Access Control Command in Computer System
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
CACM
2011
134views more  CACM 2011»
12 years 11 months ago
Brain-computer interfaces for communication and control
For many years people have speculated that electroencephalographic activity or other electrophysiological measures of brain function might provide a new non-muscular channel for s...
Dennis J. McFarland, Jonathan R. Wolpaw
EUSFLAT
2003
108views Fuzzy Logic» more  EUSFLAT 2003»
13 years 9 months ago
Soft computing and control of district heating system
The article deals with the possible methodology of processing of data and information for the search of prediction of heat supply daily diagram (HSDD). The methodology includes te...
Petr Dostál, Bronislav Chramcov, Jaroslav B...
SAC
1998
ACM
13 years 11 months ago
Object oriented process modeling with fuzzy logic
Fuzzy Logic has traditionally found an application in control theory, systems analysis, and artificial intelligence [9] [7]. However, it is very difficult to apply it to tradition...
Luigi Benedicenti, Giancarlo Succi, Tullio Vernazz...
SACMAT
2010
ACM
14 years 10 days ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller