Sciweavers

922 search results - page 26 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
RECSYS
2009
ACM
15 years 4 months ago
Learning to recommend with trust and distrust relationships
With the exponential growth of Web contents, Recommender System has become indispensable for discovering new information that might interest Web users. Despite their success in th...
Hao Ma, Michael R. Lyu, Irwin King
SACMAT
2004
ACM
15 years 3 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann
RAS
2006
110views more  RAS 2006»
14 years 9 months ago
A methodology for provably stable behaviour-based intelligent control
This paper presents a design methodology for a class of behaviour-based control systems, arguing its potential for application to safety critical systems. We propose a formal basi...
Christopher J. Harper, Alan F. T. Winfield
APLAS
2003
ACM
15 years 2 months ago
Controlling and Optimizing the Usage of One Resource
This paper studies the problem of resource availability in the context of mobile code for embedded systems such as smart cards. It presents an architecture dedicated to controlling...
Antoine Galland, Mathieu Baudet
SACMAT
2009
ACM
15 years 4 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode