Sciweavers

2097 search results - page 24 / 420
» Distributed user modelling for universal information access
Sort
View
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
15 years 6 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
15 years 7 months ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
106
Voted
FCT
2001
Springer
15 years 6 months ago
Universal Algebra and Computer Science
Abstract. Generalising modules over associative rings, the notion of modules for an endofunctor of any category is well established and useful in large parts of mathematics includi...
Boris I. Plotkin, Tanya Plotkin
INFOCOM
2011
IEEE
14 years 5 months ago
A prior-free revenue maximizing auction for secondary spectrum access
—Dynamic spectrum allocation has proven promising for mitigating the spectrum scarcity problem. In this model, primary users lease chunks of under-utilized spectrum to secondary ...
Ajay Gopinathan, Zongpeng Li
ICC
2009
IEEE
233views Communications» more  ICC 2009»
15 years 8 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi