Sciweavers

1407 search results - page 197 / 282
» Systems Theory Model for Information Security
Sort
View
EDOC
2007
IEEE
14 years 1 months ago
A Tool for Enterprise Architecture Analysis
Enterprise architecture advocates model-based decision-making on enterprise-wide information system issues. In order to provide decisionmaking support, enterprise architecture mode...
Pontus Johnson, Erik Johansson, Teodor Sommestad, ...
ALIFE
1998
13 years 9 months ago
Emergence of Multicellular Organisms with Dynamic Differentiation and Spatial Pattern
The origin of multicellular organisms and the mechanism of development in cell societies are studied by choosing a model with intracellular biochemical dynamics allowing for oscill...
Chikara Furusawa, Kunihiko Kaneko
SACMAT
2009
ACM
14 years 3 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
RECSYS
2009
ACM
14 years 3 months ago
Collaborative prediction and ranking with non-random missing data
A fundamental aspect of rating-based recommender systems is the observation process, the process by which users choose the items they rate. Nearly all research on collaborative ...
Benjamin M. Marlin, Richard S. Zemel
AVSS
2008
IEEE
14 years 3 months ago
Person Tracking with Audio-Visual Cues Using the Iterative Decoding Framework
Tracking humans in an indoor environment is an essential part of surveillance systems. Vision based and microphone array based trackers have been extensively researched in the pas...
Shankar T. Shivappa, Mohan M. Trivedi, Bhaskar D. ...