Sciweavers

880 search results - page 41 / 176
» The evolution of technology within a simple computer model
Sort
View
ADCS
2004
14 years 11 months ago
On the Effectiveness of Relevance Profiling
Relevance profiling is a general process for withindocument retrieval. Given a query, a profile of retrieval status values is computed by sliding a fixed sized window across a doc...
David J. Harper, David Lee
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 1 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
91
Voted
EDOC
2008
IEEE
15 years 4 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
BCS
2008
14 years 11 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
NCA
2006
IEEE
14 years 9 months ago
Open-loop regulation and tracking control based on a genealogical decision tree
The goal of this paper is to design a new control algorithm for open-loop control of complex systems. This control approach is based on a genealogical decision tree for both regula...
Kaddour Najim, Enso Ikonen, P. Del Moral