Sciweavers

1353 search results - page 151 / 271
» Securing Current and Future Process Control Systems
Sort
View
142
Voted
IMCSIT
2010
15 years 28 days ago
The development features of the face recognition system
Nowadays personal identification is a very important issue. There is a wide range of applications in different spheres, such as video surveillance security systems, control of docu...
Rauf Sadykhov, Igor Frolov
130
Voted
SACMAT
2010
ACM
15 years 2 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
120
Voted
AEI
2000
63views more  AEI 2000»
15 years 3 months ago
Application of a support system to the design of wastewater treatment plants
This paper presents a case study that explores the advantages that can be derived from the use of a design support system during the design of wastewater treatment plants (WWTP). ...
Ignasi Rodríguez-Roda, Manel Poch, Ren&eacu...
130
Voted
ECCE
2007
15 years 5 months ago
Lateral control support for car drivers: a human-machine cooperation approach
Motivation – This paper is based on a research project which examines the way car drivers and automated devices cooperate to achieve lateral control of a vehicle. A theoretical ...
Jordan Navarro, Franck Mars, Jean-Michel Hoc
131
Voted
USS
2008
15 years 6 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger