Sciweavers

154 search results - page 22 / 31
» Security architecture testing using IDS - a case study
Sort
View
ESORICS
1994
Springer
15 years 1 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
GRID
2000
Springer
15 years 1 months ago
Data Management in an International Data Grid Project
Abstract. In this paper we report on preliminary work and architectural design carried out in the "Data Management" work package in the International Data Grid project. O...
Wolfgang Hoschek, Francisco Javier Jaén-Mar...
CEC
2005
IEEE
15 years 3 months ago
Modeling and analysis of indirect communication in particle swarm optimization
Abstract- Particle Swarm Optimization (PSO) has successfully been applied to many optimization problems. One particularly interesting aspect of these algorithms is to study the com...
S. Helwig, Christian Haubelt, Jürgen Teich
WSC
2000
14 years 11 months ago
Simulation as educational support for production and logistics in industrial engineering
The proposed implementation is a monitor system able to train operators for on-line real time manufacturing control in order to analyze the performance of a production process. Th...
Agostino G. Bruzzone, Pietro Giribone, Roberto Rev...
ICPPW
2002
IEEE
15 years 2 months ago
A Statistical Approach for the Analysis of the Relation Between Low-Level Performance Information, the Code, and the Environment
This paper presents a methodology for aiding a scientific programmer to evaluate the performance of parallel programs on advanced architectures. It applies well-defined design o...
Nayda G. Santiago, Diane T. Rover, Domingo Rodr&ia...