Sciweavers

475 search results - page 18 / 95
» Reasoning About the Transfer of Control
Sort
View
CCE
2007
13 years 8 months ago
Optimal operation of simple refrigeration cycles: Part I: Degrees of freedom and optimality of sub-cooling
The paper focuses on the operation of simple refrigeration cycles. With equipment given, there are, from a control and operational point of view, five steady-state degrees of fre...
Jørgen Bauck Jensen, Sigurd Skogestad
IADIS
2003
13 years 10 months ago
Informatization and E-Business Model Application for Distributed Data Mining Using Mobile Agents
Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining ...
Ezendu Ifeanyi Ariwa, Mohamed B. Senousy, Mohamed ...
PERCOM
2009
ACM
14 years 3 months ago
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks
— Future application areas of wireless sensor networks (WSNs) may include industrial process automation, aircraft control systems or patient monitoring in hospitals. Such applica...
Petcharat Suriyachai, Utz Roedig, Andrew Scott
MMMACNS
2005
Springer
14 years 2 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
ICDIM
2010
IEEE
13 years 6 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski