Sciweavers

7918 search results - page 1234 / 1584
» Model Composition Directives
Sort
View
MSCS
2010
84views more  MSCS 2010»
15 years 3 months ago
Channel abstractions for network security
Abstractions for Network Security† MICH E L E B U G L I E S I, R I C C A R D O F O C A R D I Dipartimento di Informatica, Universit`a Ca’ Foscari, Venice. Received 6 October 20...
Michele Bugliesi, Riccardo Focardi
RAID
2010
Springer
15 years 3 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
SCP
2010
78views more  SCP 2010»
15 years 3 months ago
Scoping strategies for distributed aspects
Dynamic deployment of aspects brings greater flexibility and reuse potential, but requires a proper means for scoping aspects. Scoping issues are particularly crucial in a distri...
Éric Tanter, Johan Fabry, Rémi Douen...
SMC
2010
IEEE
242views Control Systems» more  SMC 2010»
15 years 3 months ago
Analysis of shopping behavior based on surveillance system
—Closed Circuit Television systems in shopping malls could be used to monitor the shopping behavior of people. From the tracked path, features can be extracted such as the relati...
Mirela Popa, Léon J. M. Rothkrantz, Zhenke ...
TASLP
2010
84views more  TASLP 2010»
15 years 3 months ago
Wideband and Isotropic Room Acoustics Simulation Using 2-D Interpolated FDTD Schemes
—In this paper, a complete method for finite-difference time-domain modeling of rooms in 2-D using compact explicit schemes is presented. A family of interpolated schemes using ...
Konrad Kowalczyk, Maarten van Walstijn
« Prev « First page 1234 / 1584 Last » Next »