Sciweavers

979 search results - page 101 / 196
» The dynamic granularity memory system
Sort
View
ICDS
2009
IEEE
15 years 4 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
SACMAT
2003
ACM
15 years 3 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
TFS
2008
123views more  TFS 2008»
14 years 9 months ago
Numerical and Linguistic Prediction of Time Series With the Use of Fuzzy Cognitive Maps
Abstract--In this paper, we introduce a novel approach to timeseries prediction realized both at the linguistic and numerical level. It exploits fuzzy cognitive maps (FCMs) along w...
Wojciech Stach, Lukasz A. Kurgan, Witold Pedrycz
CCS
2009
ACM
15 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
WISE
2002
Springer
15 years 2 months ago
A Content-Based Resource Location Mechanism in PeerIS
With the flurry of research on P2P computing, many P2P technical challenges have emerged, one of which is how to efficiently locate desired resources. Advances have been made in...
Bo Ling, Zhiguo Lu, Wee Siong Ng, Beng Chin Ooi, K...