Sciweavers

92 search results - page 14 / 19
» Active Audition for Humanoid
Sort
View
ICDE
2006
IEEE
128views Database» more  ICDE 2006»
15 years 7 months ago
Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology
The Sarbanes-Oxley Act instituted a series of corporate reforms to improve the accuracy and reliability of financial reporting. Sections 302 and 404 of the Act require SEC-reporti...
Rakesh Agrawal, Christopher M. Johnson, Jerry Kier...
89
Voted
DISCEX
2003
IEEE
15 years 7 months ago
Surveillance Detection in High Bandwidth Environments
In this paper, we describe System Detection’s surveillance detection techniques for enclave environments (ESD) and peering center environments (PSD) and evaluate each technique ...
Seth Robertson, Eric V. Siegel, Matthew Miller, Sa...
131
Voted
POLICY
2001
Springer
15 years 6 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ICDCS
1998
IEEE
15 years 6 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
113
Voted
JCNS
2010
81views more  JCNS 2010»
15 years 8 days ago
Sensory information in local field potentials and spikes from visual and auditory cortices: time scales and frequency bands
Studies analyzing sensory cortical processing or trying to decode brain activity often rely on a combination of different electrophysiological signals, such as local field potentia...
Andrei Belitski, Stefano Panzeri, Cesare Magri, Ni...