Sciweavers

1407 search results - page 145 / 282
» Systems Theory Model for Information Security
Sort
View
ARC
2010
Springer
154views Hardware» more  ARC 2010»
13 years 8 months ago
Perspectives on system identification
: System identification is the art and science of building mathematical models of dynamic systems from observed input-output data. It can be seen as the interface between the real ...
Lennart Ljung
NPAR
2009
ACM
14 years 3 months ago
Airbrush simulation for artwork and computer modeling
A computerized airbrush system with a full three dimensional airbrush interface is presented. The position and orientation of an electronic airbrush tool is tracked in space, and,...
Jonathan Konieczny, Gary W. Meyer
CIKM
2011
Springer
12 years 8 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 8 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
CCS
2008
ACM
13 years 10 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...