Sciweavers

1407 search results - page 103 / 282
» Systems Theory Model for Information Security
Sort
View
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
14 years 27 days ago
Equilibrium species counts and migration model tradeoffs for biogeography-based optimization
—Motivated by the migration mechanisms of ecosystems, various extensions to biogeography-based optimization (BBO) are proposed. BBO is an original optimization method based on th...
Haiping Ma, Suhong Ni, Man Sun
CISS
2011
IEEE
12 years 12 months ago
New hypothesis testing-based methods for fault detection for smart grid systems
Abstract—Fault detection plays an indispensable role in ensuring the security of smart grid systems. Based on the dynamics of the generators, we show the time evolution of the sm...
Qian He, Rick S. Blum
CSL
2002
Springer
13 years 8 months ago
A conversation acts model for generating spoken dialogue contributions
In this paper, we describe a generation system for spoken dialogue that not only produces coherent, informative and responsive dialogue contributions, but also explicitly models h...
Amanda Stent
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 2 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
ITCC
2003
IEEE
14 years 1 months ago
Cluster-Weighted Modeling as a basis for Fuzzy Modeling
The Cluster-Weighted Modeling (CWM) is emerging as a versatile tool for modeling dynamical systems. It is a mixture density estimator around local models. To be specific, the inpu...
Madasu Hanmandlu, Vamsi Krishna Madasu, Shantaram ...