Sciweavers

2740 search results - page 507 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
CCS
2009
ACM
15 years 4 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
EDBT
2009
ACM
184views Database» more  EDBT 2009»
15 years 4 months ago
Distributed similarity search in high dimensions using locality sensitive hashing
In this paper we consider distributed K-Nearest Neighbor (KNN) search and range query processing in high dimensional data. Our approach is based on Locality Sensitive Hashing (LSH...
Parisa Haghani, Sebastian Michel, Karl Aberer
74
Voted
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
15 years 4 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...
ICASSP
2007
IEEE
15 years 4 months ago
A Multi-Subject, Dynamic Bayesian Networks (DBNS) Framework for Brain Effective Connectivity
As dynamic connectivity is shown essential for normal brain function and is disrupted in disease, it is critical to develop models for inferring brain effective connectivity from ...
Junning Li, Z. Jane Wang, Martin J. McKeown
CCS
2007
ACM
15 years 4 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth