Search results
-
-
Title
-
Assured Information Sharing for Ad-hoc Collaboration
-
Author
-
Jin, Jing
-
Date Created
-
2009
-
Subjects--Topical
-
Computer engineering, Information technology
-
Description
-
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping wi...
-
-
Title
-
Automated Meta-Actions Discovery for Personalized Medical Treatments
-
Author
-
Touati, Hakim
-
Date Created
-
2014
-
Subjects--Topical
-
Computer science, Health services administration
-
Description
-
Healthcare, among other domains, provides an attractive ground of work for knowledge discovery researchers. There exist several branches of health informatics and health data-mining from which we find actionable knowledge discovery is underserved....
-
-
Title
-
Automated formal analytics for smart grid security and resiliency
-
Author
-
Rahman, Mohammad
-
Date Created
-
2015
-
Subjects--Topical
-
Computer science, Sports administration
-
Description
-
Smart grid is the modernization of the legacy electric power system in which cyber computing and communications are integrated with the physical world of power systems. A smart grid provides efficient and cost-effective management of the grid by a...
-
-
Title
-
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
-
Author
-
Besmer, Andrew
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Users are burdened with the task of configuring access control policies on many different application platforms used by mobile devices and social network sites. Many of these platforms employ access control mechanisms to configure application perm...
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
Constraint-based Generation of Database States for Testing Database Applications
-
Author
-
Pan, Kai
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science
-
Description
-
Testing is essential for quality assurance of database applications.To test the quality of database applications, it usually requirestest inputs consisting of both program input values andcorresponding database states. However, producing these tes...
-
-
Title
-
Coordinating decentralized learning and conflict resolution across agent boundaries
-
Author
-
Cheng, Shanjun
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science, Information technology, Artificial intelligence
-
Description
-
It is crucial for embedded systems to adapt to the dynamics of openenvironments. This adaptation process becomes especially challenging in the context of multiagent systems because of scalability, partial information accessibility and complex inte...
-
-
Title
-
DECISION SUPPORT FOR CRITICAL INFRASTRUCTURE RECOVERY
-
Author
-
Pala, Okan
-
Date Created
-
2014
-
Subjects--Topical
-
Geodesy, Information science
-
Description
-
Protecting critical infrastructure systems, such as electrical power grids, has become a primary concern for many governments and organizations across a variety of stakeholder perspectives. Critical infrastructures involve multi dimensional, highl...
-
-
Title
-
Data Mining the Serous Ovarian Tumor Transcriptome
-
Author
-
Tickle, Timothy
-
Date Created
-
2011
-
Subjects--Topical
-
Bioinformatics, Genetics
-
Description
-
Ovarian cancer is the most lethal gynecologic cancer in the United States. If caught in early stages, patient survival rate is 94%, late stage survival rates drop to 28%. It is because most cases are caught in late stages that high mortality is se...
-
-
Title
-
Development of a multi-layered botmaster based analysis framework
-
Author
-
Paxton, Napoleon
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Botnets are networks of compromised machines called bots that come together to form the tool of choice for hackers in the exploitation and destruction of computer networks. Most malicious botnets have the ability to be rented out to a broad range ...