Sciweavers

505 search results - page 80 / 101
» Implementation of Belief Change Operators Using BDDs
Sort
View
ECAI
2008
Springer
14 years 11 months ago
Intelligent adaptive monitoring for cardiac surveillance
Monitoring patients in intensive care units is a critical task. Simple condition detection is generally insufficient to diagnose a patient and may generate many false alarms to the...
Lucie Callens, Guy Carrault, Marie-Odile Cordier, ...
INFOSCALE
2007
ACM
14 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
101
Voted
DBSEC
2001
129views Database» more  DBSEC 2001»
14 years 11 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
ATAL
2010
Springer
14 years 10 months ago
MAS-DisCoSim 4 PDP: a testbed for multi-agent solutions to PDPs
This demo illustrates MAS-DisCoSim 4 PDP, a testbed environment for evaluating distributed multi-agent system solutions to pickup and delivery problems (PDPs). PDPs are well-studi...
Jelle Van Gompel, Bart Tuts, Rutger Claes, Mario C...
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
14 years 9 months ago
Evaluating the Effect of Upgrade, Control and Development Strategies on Robustness and Failure Risk of the Power Transmission Gr
We use the OPA complex systems model of the power transmission system to investigate the effect of a series of different network upgrade scenarios on the long time dynamics and th...
David E. Newman, Benjamin A. Carreras, Vickie E. L...