Sciweavers

1407 search results - page 167 / 282
» Systems Theory Model for Information Security
Sort
View
VRST
2004
ACM
14 years 1 months ago
Modeling and rendering of walkthrough environments with panoramic images
An important, potential application of image-based techniques is to create photo-realistic image-based environments for interactive walkthrough. However, existing image-based stud...
Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau
SACMAT
2005
ACM
14 years 1 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
WORM
2003
13 years 9 months ago
Worm propagation modeling and analysis under dynamic quarantine defense
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement automatic mitigation, such as dynamic quarantine, on computer networks. Enlighten...
Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
WWW
2003
ACM
14 years 9 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
ICRA
2002
IEEE
131views Robotics» more  ICRA 2002»
14 years 1 months ago
Acquisition and Embodiment of Motion Elements in Closed Mimesis Loop
It is needed for humanoid to acquire not only just a trajectory but also aim of the behavior and symbolic information during behavior development. We have proposed the mimesis sys...
Tetsunari Inamura, Iwaki Toshima, Yoshihiko Nakamu...