Sciweavers

2838 search results - page 225 / 568
» Verifying Controlled Components
Sort
View
106
Voted
VLDB
2004
ACM
245views Database» more  VLDB 2004»
15 years 6 months ago
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...
Walid Rjaibi, Paul Bird
ACMSE
2006
ACM
15 years 2 months ago
Tic-Tac-LEGO: an investigation into coordinated robotic control
The Lego Mindstorms Robot Command eXplorer (RCX) is a popular robotics kit that provides an immediate "out-of-the-box" opportunity to explore software controlled robot i...
Ruben Vuittonet, Jeff Gray
131
Voted
JODS
2007
138views Data Mining» more  JODS 2007»
15 years 19 days ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
ICPR
2006
IEEE
16 years 1 months ago
Dimensionality Reduction with Adaptive Kernels
1 A kernel determines the inductive bias of a learning algorithm on a specific data set, and it is beneficial to design specific kernel for a given data set. In this work, we propo...
Shuicheng Yan, Xiaoou Tang
88
Voted
DATE
2008
IEEE
78views Hardware» more  DATE 2008»
15 years 7 months ago
Transistor-Specific Delay Modeling for SSTA
SSTA has received a considerable amount of attention in recent years. However, it is a general rule that any approach can only be as accurate as the underlying models. Thus, varia...
Brian Cline, Kaviraj Chopra, David Blaauw, Andres ...