Sciweavers

373 search results - page 57 / 75
» Trustworthy Information: Concepts and Mechanisms
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 1 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
GECCO
2007
Springer
191views Optimization» more  GECCO 2007»
14 years 1 months ago
Particle swarm guided evolution strategy
Evolution strategy (ES) and particle swarm optimization (PSO) are two of the most popular research topics for tackling real-parameter optimization problems in evolutionary computa...
Chang-Tai Hsieh, Chih-Ming Chen, Ying-Ping Chen
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 1 months ago
Video Database Modeling and Temporal Pattern Retrieval using Hierarchical Markov Model Mediator
The dream of pervasive multimedia retrieval and reuse will not be realized without incorporating semantics in the multimedia database. As video data is penetrating many informatio...
Na Zhao, Shu-Ching Chen, Mei-Ling Shyu
CNSR
2005
IEEE
14 years 1 months ago
Shortest-Hop Based Reliable Network Multicast
Although many multicast communication protocols have been recommended at IETF, reliable multicast communications currently rely on programs built at the application layer, e.g., m...
Ka Lun Eddie Law, Daniel Siu
ISMDA
2005
Springer
14 years 1 months ago
The Ontological Lens: Zooming in and out from Genomic to Clinical Level
Abstract. Ontology is the talk of the day in the medical informatics comm.unity. Its relevant role in the design and implementation of information systems in health care is now wid...
Domenico M. Pisanelli, Francesco Pinciroli, Marco ...