Sciweavers

883 search results - page 63 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
CCS
2010
ACM
15 years 25 days ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
FLAIRS
2007
15 years 3 months ago
Accessing XML Documents Using Semantic Meta Data in a P2P Environment
XGR (XML Data Grid) and BabelPeers are both data management systems based on distributed hash tables (DHT) that use the Pastry DHT to store data and meta data. XGR is based on the...
Dominic Battré, Felix Heine, André H...
MMNS
2003
98views Multimedia» more  MMNS 2003»
15 years 2 months ago
Managing Services Quality through Admission Control and Active Monitoring
We propose a lightweight traffic admission control scheme based on on-line monitoring which ensures multimedia services quality both intra-domain and end-to-end. The AC strategy i...
Solange Rito Lima, Paulo Carvalho, Alexandre Santo...
IADIS
2004
15 years 2 months ago
Inca: An Intelligent Cognitive Agent-Based Framework for Adaptive and Interactive Learning
This paper presents the design principles, development and implementation of an e-learning framework, called Intelligent Cognitive Agents (InCA). The InCA framework is an ontology...
Liana Razmerita, Thierry Nabeth, Albert A. Angehrn...
91
Voted
SACMAT
2010
ACM
15 years 5 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu