Sciweavers

963 search results - page 19 / 193
» Modeling and analysis of real -time systems with mutex compo...
Sort
View
ISI
2005
Springer
15 years 3 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
EDOC
2003
IEEE
15 years 2 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
HICSS
2008
IEEE
95views Biometrics» more  HICSS 2008»
15 years 4 months ago
A Real-Options Approach to Modeling Investments in Competitive, Dynamic Retail Markets
The proliferation of retail outlets with nearly identical product offerings and similar costs due to market efficiency means that selecting an appropriate market to open a store i...
Baabak Ashuri, William B. Rouse, Douglas A. Bodner
QOSA
2010
Springer
15 years 1 months ago
Parameterized Reliability Prediction for Component-Based Software Architectures
Critical properties of software systems, such as reliability, should be considered early in the development, when they can govern crucial architectural design decisions. A number o...
Franz Brosch, Heiko Koziolek, Barbora Buhnova, Ral...
82
Voted
SIGCOMM
2009
ACM
15 years 4 months ago
Modeling energy efficiency in wireless internet communication
For wireless mobile Internet users the length of the battery life is one of the most important performance factors. The energy efficiency of the data transmission over radio is a ...
Enrico Rantala, Arto Karppanen, Seppo Granlund, Pa...