Sciweavers

6555 search results - page 1106 / 1311
» Secure attribute-based systems
Sort
View
143
Voted
WSC
2004
15 years 4 months ago
Operational Analysis Framework for Emergency Operations Center Preparedness Training
As the U.S. Department of Homeland Security works to create an integrated emergency response system, it is evident that computer-based solutions can support this process. Individu...
Eytan Pollak, Mark Falash, Lorie Ingraham, Vivian ...
118
Voted
USENIX
2000
15 years 4 months ago
The Globe Distribution Network
The goal of the Globe project is to design and build a middleware platform that facilitates the development of large-scale distributed applications, such as those found on the Int...
Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz,...
147
Voted
SEC
1996
15 years 4 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
143
Voted
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 4 months ago
Support vector machine classifiers for sequential decision problems
Classification problems in critical applications such as health care or security often require very high reliability because of the high costs of errors. In order to achieve this r...
Eladio Rodriguez Diaz, David A. Castaon
127
Voted
COMAD
2009
15 years 4 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
« Prev « First page 1106 / 1311 Last » Next »