Sciweavers

1407 search results - page 185 / 282
» Systems Theory Model for Information Security
Sort
View
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 5 months ago
Support vector machine classifiers for sequential decision problems
Classification problems in critical applications such as health care or security often require very high reliability because of the high costs of errors. In order to achieve this r...
Eladio Rodriguez Diaz, David A. Castaon
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
15 years 5 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
14 years 4 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...
WSC
2007
15 years 6 months ago
Simulation of passenger check-in at a medium-sized US airport
Delays in the check-in system at an airport vary with times of the day, day of the week, and types of check-in modes chosen by the passengers. Extensive data collection of the che...
Simone Appelt, Rajan Batta, Li Lin, Colin G. Drury
ECSCW
2001
15 years 5 months ago
Team automata for spatial access control
Abstract. Team automata provide a framework for capturing notions like coordination, colon, and cooperation in distributed systems. They consist of an abstract specification of com...
Maurice H. ter Beek, Clarence A. Ellis, Jetty Klei...