Sciweavers

4511 search results - page 772 / 903
» Observation Based System Security
Sort
View
GLOBECOM
2010
IEEE
14 years 8 months ago
Cognitive Network Inference through Bayesian Network Analysis
Cognitive networking deals with applying cognition to the entire network protocol stack for achieving stack-wide as well as network-wide performance goals, unlike cognitive radios ...
Giorgio Quer, Hemanth Meenakshisundaram, Tamma Bhe...
ICETET
2009
IEEE
14 years 7 months ago
Development of HCNG Blended Fuel Engine with Control of NOx Emissions
With increasing concern about energy shortage and environmental protection, research on reducing exhaust emissions, reducing fuel consumption, reducing engine noise and increasing...
K. R. Patil, P. M. Khanwalkar, S. S. Thipse, K. P....
ICSR
2009
Springer
14 years 7 months ago
Reusing Patterns through Design Refinement
Abstract. Refinement concepts, such as procedural and data refinement, are among the most important ideas of software engineering. In this paper, we investigate the idea of design ...
Jason O. Hallstrom, Neelam Soundarajan
IGARSS
2009
14 years 7 months ago
Integrating Remote Sensing and Ancillary Data for Regional Ecosystem Assessment: Eucalyptus Grandis Agro-system in KwaZulu-Natal
The ability of various ecosystems to perform vital functions such as biodiversity production, and water, energy and nutrient cycling depends on the ecosystem state, i.e. health. E...
Moses Azong Cho, Jan van Aardt, Bongani Majeke, Ru...
97
Voted
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
15 years 10 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger