Sciweavers

318 search results - page 4 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 2 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
87
Voted
CCS
2009
ACM
15 years 4 months ago
Inferring privacy policies for social networking services
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have acc...
George Danezis
ICSE
2004
IEEE-ACM
15 years 9 months ago
An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition
Building a configuration management (CM) system is a difficult endeavor that regularly requires tens of thousands of lines of code to be written. To reduce this effort, several ex...
Ronald van der Lingen, André van der Hoek
82
Voted
AIPS
2008
14 years 12 months ago
Criticality Metrics for Distributed Plan and Schedule Management
We address the problem of coordinating the plans and schedules for a team of agents in an uncertain and dynamic environment. Bounded rationality, bounded communication, subjectivi...
Rajiv T. Maheswaran, Pedro A. Szekely
96
Voted
MHCI
2005
Springer
15 years 3 months ago
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Dan Hong, Mingxuan Yuan, Vincent Y. Shen