Sciweavers

1353 search results - page 118 / 271
» Securing Current and Future Process Control Systems
Sort
View
136
Voted
CAISE
2004
Springer
15 years 9 months ago
Network-based Business Process Management: a Discussion on Embedding Business Logic in Communications Networks
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
Louis-François Pau, Peter H. M. Vervest
ICASSP
2008
IEEE
15 years 10 months ago
An instantaneous vector representation of delta pitch for speaker-change prediction in conversational dialogue systems
As spoken dialogue systems become deployed in increasingly complex domains, they face rising demands on the naturalness of interaction. We focus on system responsiveness, aiming t...
Kornel Laskowski, Jens Edlund, Mattias Heldner
145
Voted
MABS
2004
Springer
15 years 8 months ago
A Hybrid Micro-Simulator for Determining the Effects of Governmental Control Policies on Transport Chains
Abstract. A simulation-based tool is described which will be used to investigate how the actors in a transport chain are expected to act when different types of governmental contro...
Markus Bergkvist, Paul Davidsson, Jan A. Persson, ...
169
Voted
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 7 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
ICWS
2008
IEEE
15 years 5 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar