Sciweavers

151 search results - page 17 / 31
» Reference Models for E-Services Integration Based on Life-Ev...
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 7 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
CORR
2004
Springer
146views Education» more  CORR 2004»
13 years 7 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
IROS
2009
IEEE
129views Robotics» more  IROS 2009»
14 years 2 months ago
Predicting the navigation performance of underwater vehicles
— In this paper we present a general framework for predicting the positioning uncertainty of underwater vehicles. We apply this framework to common examples from marine robotics:...
Brian Bingham
DOLAP
2005
ACM
13 years 9 months ago
Goal-oriented requirement analysis for data warehouse design
Several surveys indicate that a significant percentage of data warehouses fail to meet business objectives or are outright failures. One of the reasons for this is that requireme...
Paolo Giorgini, Stefano Rizzi, Maddalena Garzetti
ACMDIS
2006
ACM
14 years 1 months ago
Investigating design knowledge reuse for interface development
Reusing HCI design knowledge shows potential in allowing practitioners to design based on previously identified concerns. A reuse approach is presented that is based on claims, de...
Shahtab Wahid