Sciweavers

979 search results - page 110 / 196
» Developing Dynamic Security Policies
Sort
View
113
Voted
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
15 years 9 months ago
Offshore Outsourcing: Counteracting Forces and Their Dynamic Effects
Many argue that offshoring is an inexorable trend since IT skills have become a global commodity and they are vastly cheaper in other parts of the world. According to this view, m...
Amitava Dutta, Rahul Roy
IPPS
2002
IEEE
15 years 8 months ago
Optimal Remapping in Dynamic Bulk Synchronous Computations via a Stochastic Control Approach
A bulk synchronous computation proceeds in phases that are separated by barrier synchronization. For dynamic bulk synchronous computations that exhibit varying phase-wise computat...
Gang George Yin, Cheng-Zhong Xu, Le Yi Wang
DSN
2007
IEEE
15 years 10 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer
ATAL
2004
Springer
15 years 9 months ago
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
We describe a new smart meeting room system called EasyMeeting that explores the use of FIPA agent technologies, Semantic Web ontologies, logic reasoning, and security and privacy...
Harry Chen, Filip Perich, Dipanjan Chakraborty, Ti...
CDC
2010
IEEE
111views Control Systems» more  CDC 2010»
14 years 11 months ago
Multi-robot monitoring in dynamic environments with guaranteed currency of observations
Abstract-- In this paper we consider the problem of monitoring a known set of stationary features (or locations of interest) in an environment. To observe a feature, a robot must v...
Stephen L. Smith, Daniela Rus