Sciweavers

106 search results - page 19 / 22
» Secure Computability of Functions in the IT Setting with Dis...
Sort
View
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
14 years 27 days ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
IEEEARES
2007
IEEE
14 years 2 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
BTW
2005
Springer
80views Database» more  BTW 2005»
14 years 2 months ago
Measuring the Quality of Approximated Clusterings
Abstract. Clustering has become an increasingly important task in modern application domains. In many areas, e.g. when clustering complex objects, in distributed clustering, or whe...
Hans-Peter Kriegel, Martin Pfeifle
SAFECOMP
2007
Springer
14 years 2 months ago
Controller Architecture for Safe Cognitive Technical Systems
Abstract. Cognition of technical systems, as the ability to perceive situations, to learn about favorable behavior, and to autonomously generate decisions, adds new attributes to s...
Sebastian Kain, Hao Ding, Frank Schiller, Olaf Stu...
GI
2004
Springer
14 years 1 months ago
Towards a Framework and a Design Methodology for Autonomic Integrated Systems
: The transition from microelectronics to nanoelectronics reaches physical limits and results in a paradigm shift in the design and fabrication of electronic circuits. The conserva...
Andreas Herkersdorf, Wolfgang Rosenstiel