Sciweavers

1147 search results - page 119 / 230
» Transformation of Access Rights
Sort
View
AHS
2006
IEEE
108views Hardware» more  AHS 2006»
13 years 11 months ago
A Multi-Objective Genetic Algorithm for On-Chip Real-time Adaptation of a Multi-Carrier Based Telecommunications Receiver
This paper presents a multi-objective algorithm for on-line adaptation of a multi-carrier code-division multiple access (MC-CDMA) receiver. A specially tailored Genetic Algorithm ...
Nasri Sulaiman, Ahmet T. Erdogan
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 9 months ago
Providing Data Group Anonymity Using Concentration Differences
Public access to digital data can turn out to be a cause of undesirable information disclosure. That's why it is vital to somehow protect the data before publishing. There are...
Oleg Chertov, Dan Tavrov
BPSC
2010
139views Business» more  BPSC 2010»
13 years 7 months ago
Static Information Flow Analysis of Workflow Models
: This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of acces...
Rafael Accorsi, Claus Wonnemann
BALT
2010
13 years 3 months ago
Interoperability Services for Models and Ontologies
Model-based approaches in the UML/MOF technological space and ontology-based approaches in the OWL technological space both support conceptual modeling using different kinds of rep...
Jürgen Ebert, Tobias Walter
ISI
2007
Springer
14 years 3 months ago
Design and Implementation of a Middleware for Sentient Spaces
— Surveillance is an important task for guaranteeing the security of individuals. Being able to intelligently monitor the activity in given spaces is essential to achieve such su...
Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyu...