Sciweavers

2658 search results - page 187 / 532
» Micro-communication Element System
Sort
View
131
Voted
INFORMATICALT
2006
75views more  INFORMATICALT 2006»
15 years 5 months ago
Repository for Business Rules Based IS Requirements
The quality of software engineering projects often suffers due to the large gap between the way stakeholders present their requirements and the way analysts capture and express tho...
Kestutis Kapocius, Rimantas Butleris
CSDA
2007
105views more  CSDA 2007»
15 years 5 months ago
GSA-based maximum likelihood estimation for threshold vector error correction model
The log-likelihood function of threshold vector error correction models is neither differentiable, nor smooth with respect to some parameters. Therefore, it is very difficult to ...
Zheng Yang, Zheng Tian, Zixia Yuan
123
Voted
CTW
2007
91views more  CTW 2007»
15 years 5 months ago
Collaborative cross-checking to enhance resilience
Resilience, the ability to adapt or absorb disturbance, disruption, and change, may be increased by team processes in a complex, socio-technical system. In particular, collaborativ...
Emily S. Patterson, David D. Woods, Richard I. Coo...
147
Voted
JHSN
2006
100views more  JHSN 2006»
15 years 4 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
188
Voted
KES
2008
Springer
15 years 4 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini