Sciweavers

1509 search results - page 210 / 302
» Tracking Real-Time Systems Requirements
Sort
View
BIRTHDAY
2011
Springer
12 years 8 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
TELSYS
2010
140views more  TELSYS 2010»
13 years 2 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
KES
2005
Springer
14 years 1 months ago
A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System
In most P2P business models, in which users purchase the media, it is necessary to securely identify the user in order to facilitate payment. In this paper, we present a technique ...
Ron G. van Schyndel
BILDMED
2007
107views Algorithms» more  BILDMED 2007»
13 years 9 months ago
Interactive Guidance System for C-Arm Repositioning Without Radiation
Abstract. The problem of repositioning mobile C-arms to defined target locations during surgical procedures currently requires not only time, but also skill and additional radiati...
Tassilo Klein, Selim Benhimane, Jörg Traub, S...
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 9 months ago
UNIT: User-centric Transaction Management in Web-Database Systems
Web-database systems are nowadays an integral part of everybody's life, with applications ranging from monitoring/trading stock portfolios, to personalized blog aggregation a...
Alexandros Labrinidis, Daniel Mossé, Huimin...