Sciweavers

530 search results - page 37 / 106
» Security Analysis of Open Building Automation Systems
Sort
View
RIDE
1999
IEEE
15 years 2 months ago
Modeling and Analysis of Interactions in Virtual Enterprises
Advances in computer networking technology and open system standards are making the creation and management of virtual enterprises feasible. A virtual enterprise is a temporary co...
Hasan Davulcu, Michael Kifer, L. Robert Pokorny, C...
GECCO
2008
Springer
180views Optimization» more  GECCO 2008»
14 years 10 months ago
Bond-graphs + genetic programming: analysis of an automatically synthesized rotary mechanical system
Initial results of an experiment devised to combine Bond-Graph modeling and simulation with genetic programming for automated design of a simple mechatronic system are reported in...
Saheeb Ahmed Kayani, Muhammad Afzaal Malik
SISW
2003
IEEE
15 years 3 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
85
Voted
DOLAP
2000
ACM
15 years 2 months ago
Towards OLAP Security Design - Survey and Research Issues
With the use of data warehousing and online analytical processing (OLAP) for decision support applications new security issues arise. The goal of this paper is to introduce an OLA...
Torsten Priebe, Günther Pernul
ISSTA
2010
ACM
15 years 1 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su