Sciweavers

762 search results - page 99 / 153
» Security Contexts in Autonomic Systems
Sort
View
JFR
2007
150views more  JFR 2007»
13 years 10 months ago
Decisional autonomy of planetary rovers
To achieve the ever increasing demand for science return, planetary exploration rovers require more autonomy to successfully perform their missions. Indeed, the communication dela...
Félix Ingrand, Simon Lacroix, Solange Lemai...
IROS
2006
IEEE
140views Robotics» more  IROS 2006»
14 years 4 months ago
Developing a non-intrusive biometric environment
— The development of large scale biometric systems requires experiments to be performed on large amounts of data. Existing capture systems are designed for fixed experiments and...
Lee Middleton, David K. Wagg, Alex I. Bazin, John ...
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
14 years 4 months ago
Ranking Issues for Information Integration
Ranking of query/search answers, although introduced by early information retrieval systems, has become mandatory for internet searches. When the answers of a query or search are ...
Aditya Telang, Roochi Mishra, Sharma Chakravarthy
IJAR
2007
104views more  IJAR 2007»
13 years 10 months ago
On representation and aggregation of social evaluations in computational trust and reputation models
Interest for computational trust and reputation models is on the rise. One of the most important aspects of these models is how they deal with information received from other indi...
Jordi Sabater-Mir, Mario Paolucci
CCS
2004
ACM
14 years 3 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li