Sciweavers

883 search results - page 125 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
135
Voted
ISI
2004
Springer
15 years 6 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
CODES
2008
IEEE
15 years 7 months ago
Online adaptive utilization control for real-time embedded multiprocessor systems
To provide Quality of Service (QoS) guarantees in open and unpredictable environments, the utilization control problem is defined to keep the processor utilization at the schedula...
Jianguo Yao, Xue Liu, Mingxuan Yuan, Zonghua Gu
97
Voted
GCC
2005
Springer
15 years 6 months ago
The Architecture and Implementation of Resource Space Model System
Resource Space Model (RSM) is a semantic model to manage and share heterogeneous resources on the Internet. This paper focuses on the general architecture, physical implementation ...
Peng Shi, Yunpeng Xing, Erlin Yao, Zhen Wang, Kehu...
104
Voted
WWW
2002
ACM
16 years 1 months ago
A pragmatic application of the semantic web using SemTalk
The Semantic Web is a new layer of the Internet that enables semantic representation of the contents of existing web pages. Using common ontologies, human users sketch out the mos...
Christian Fillies, Gay Wood-Albrecht, Frauke Weich...
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
15 years 5 months ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong