Sciweavers

2847 search results - page 431 / 570
» The Context-Dependent Role Model
Sort
View
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
14 years 3 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
CIKM
2007
Springer
14 years 3 months ago
Generalizing from relevance feedback using named entity wildcards
Traditional adaptive filtering systems learn the user’s interests in a rather simple way – words from relevant documents are favored in the query model, while words from irre...
Abhimanyu Lad, Yiming Yang
CCECE
2006
IEEE
14 years 3 months ago
Evaluation of RNA Secondary Structure Motifs using Regression Analysis
Recent experimental evidences have shown that ribonucleic acid (RNA) plays a greater role in the cell than previously thought. An ensemble of RNA sequences believed to contain sig...
Mohammad Anwar, Marcel Turcotte
NSPW
2006
ACM
14 years 3 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
ATAL
2004
Springer
14 years 2 months ago
Strategic Deception in Agents
CHRISTIAN, DAVID B. Strategic Deception in Agents. (Under the direction of Assistant Professor R. Michael Young). Despite its negative ethical connotations, deception is a useful ...
David B. Christian, R. Michael Young