Sciweavers

8697 search results - page 1468 / 1740
» An Approach to the Enterprise Integration
Sort
View
106
Voted
ICDCS
2010
IEEE
15 years 2 months ago
Using Analog Network Coding to Improve the RFID Reading Throughput
Abstract—RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the t...
Ming Zhang, Tao Li, Shigang Chen, Bo Li
109
Voted
CAISE
2008
Springer
15 years 2 months ago
Extended Kaos to Support Variability for Goal Oriented Requirements Reuse
This work is done as part of the Tacos project1 whose aims is to define a component-based approach to specify trustworthy systems from the requirements phase to the specification p...
Farida Semmak, Christophe Gnaho, Régine Lal...
CCIA
2008
Springer
15 years 2 months ago
Probabilistic Dynamic Belief Logic for Image and Reputation
Since electronic and open environments became a reality, computational trust and reputation models have attracted increasing interest in the field of multiagent systems (MAS). Some...
Isaac Pinyol, Jordi Sabater-Mir, Pilar Dellunde
125
Voted
CCS
2008
ACM
15 years 2 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CIA
2008
Springer
15 years 2 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
« Prev « First page 1468 / 1740 Last » Next »