Sciweavers

3999 search results - page 151 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 6 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
VLDB
2001
ACM
109views Database» more  VLDB 2001»
15 years 9 months ago
Analyzing energy behavior of spatial access methods for memory-resident data
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight, together with performance considerations. Energy-conscious design is...
Ning An, Anand Sivasubramaniam, Narayanan Vijaykri...
BC
2004
97views more  BC 2004»
15 years 4 months ago
An elaborated model of fly small-target tracking
Flies have the capability to visually track small moving targets, even across cluttered backgrounds. Previous computational models, based on figure detection (FD) cells identified ...
Charles M. Higgins, Vivek Pant
TON
2002
75views more  TON 2002»
15 years 4 months ago
Optimal retrial and timeout strategies for accessing network resources
The notion of timeout (namely, the maximal time to wait before retrying an action) turns up in many networking contexts, such as packet transmission, connection establishment, etc....
Lavy Libman, Ariel Orda
ACSAC
2003
IEEE
15 years 10 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...