Sciweavers

979 search results - page 107 / 196
» Developing Dynamic Security Policies
Sort
View
GIL
2010
15 years 1 months ago
Precision Farming also for Small Scale Farmers
: The current and future food insecurity situation of many nations has been effected by factors like global warming, population growth, bio-energy, low technology acceptance, unfav...
Walter H. Mayer
ICSE
2012
IEEE-ACM
13 years 6 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
TCS
2008
15 years 3 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
137
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
A dynamic game solution to malware attack
—Given the flexibility that software-based operation provides, it is unreasonable to expect that new malware will demonstrate a fixed behavior over time. Instead, malware can d...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
AI
2000
Springer
15 years 3 months ago
Stochastic dynamic programming with factored representations
Markov decisionprocesses(MDPs) haveproven to be popular models for decision-theoretic planning, but standard dynamic programming algorithms for solving MDPs rely on explicit, stat...
Craig Boutilier, Richard Dearden, Moisés Go...