Sciweavers

448 search results - page 3 / 90
» Who is in Control
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
Base line performance measurements of access controls for libraries and modules
Having reliable security in systems is of the utmost importance. However, the existing framework of writing, distributing and linking against code in the form of libraries and/or ...
Jason W. Kim, Vassilis Prevelakis
117
Voted
CCE
2006
15 years 4 months ago
Renovating the undergraduate process control course
The undergraduate process control course and how it is taught is a controversial subject that generates lively discussions among control academicians, control practitioners, and c...
Thomas F. Edgar, Babatunde A. Ogunnaike, James J. ...
WSC
2007
15 years 6 months ago
A hybrid inventory control system approach applied to the food industry
The appropriate production and inventory control policy is a key factor for modern enterprises’ success in competitive environment. In the food industry, most of food manufactur...
David Claudio, Jie Zhang, Ying Zhang
121
Voted
DAGSTUHL
2007
15 years 5 months ago
Control Patterns in a Health Care Network
In this paper we present control patterns for the analysis and design of administrative control mechanisms in a network organization. A control pattern is a description of a generi...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...
FC
1999
Springer
184views Cryptology» more  FC 1999»
15 years 8 months ago
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...
Tomas Sander, Amnon Ta-Shma