نتایج جستجو برای: windows based

تعداد نتایج: 2955465  

2004
Maria T. M. Rodrigues Luis Gimeno Marcosiris Amorim Richard E. Montesco

Advanced Planning and Scheduling systems (APS) are intensively utilized in the industry, namely because they allow generating and analyzing planning scenarios very quickly. They are not well suited for make-to-order situations since due dates are not considered hard constraints to be fulfilled. Processing time windows allow to take into account due dates in the development of APS enhanced heuri...

2015
Alina Hang Alexander De Luca Matthew Smith Michael Richter Heinrich Hußmann

In this paper, we propose and evaluate the combination of location-based authentication with security questions as a more usable and secure fallback authentication scheme. A four weeks user study with an additional evaluation after six months was conducted to test the feasibility of the concept in the context of long-term fallback authentication. The results show that most users are able to rec...

1999
Aaron Schwartzbard Anup K. Ghosh

Windows NT has become the dominant desktop platform. To date, host-based intrusion detection research has focused on Unixavored platforms. As a result, we have a large gap between the platform people use in practice and the platforms on which intrusion detection research is active. In this paper, we examine the feasibility of applying host-based intrusion detection to the Windows NT platform. S...

2007
Erwin Aitenbichler Andreas Heinemann

Over the past few years, several authentication methods based on location-limited channels have been presented in research literature. We extend this notion to location-aware, zero-interaction authentication, present an efficient protocol implementation, and describe the integration of our authentication system into a state-of-the-art enterprise network solution.

A. Mortazavi, E.B. Saion, H. Mozdarani, H.M. Kamari, L.A. Mehdipour, M.R. Kardan, R. Faghihi, S. Mehdizadeh, S.A. Aziz, S.M.J. Mortazavi,

Background: In Iran, architectures are often unaware of the risk of radon inhalation and how to reduce radon levels. Furthermore, radon considerations are not implemented in construction methods, construction materials and building utilization by regulatory authorities. Materials and Methods: In this study after reviewing the meteorological changes of Ramsar over the past 50 years (1955-2005), ...

2002
Abdel-Badeeh M. Salem Rania A. HodHod

In this paper, we have developed a hybrid expert system prototype used for supporting diagnosis of heart diseases. The system merges uncertainty management techniques and case-based reasoning. The system is able to give appropriate diagnosis for 4 heart diseases namely; mitral stenosis, left-sided heart failure, stable angina pectoris and essential hypertension with the corresponding certainty ...

Journal: :Computers in Human Behavior 2014
Ei Pa Pa Pe-Than Dion Hoe-Lian Goh Chei Sian Lee

http://dx.doi.org/10.1016/j.chb.2014.06.023 0747-5632/ 2014 Elsevier Ltd. All rights reserved. ⇑ Corresponding author. Address: Division of Information Studies, Wee Kim Wee School of Communication and Information, Nanyang Technological University, 31 Nanyang Link, Singapore 637718, Singapore. Tel.: +65 67904460. E-mail addresses: [email protected] (E.P.P. Pe-Than), [email protected] (D.H.-L. Goh)...

Journal: :Electr. Notes Theor. Comput. Sci. 2008
Javier Cubo Gwen Salaün Carlos Canal Ernesto Pimentel Pascal Poizat

This paper presents an approach which supports verification and model-based adaptation of software components and services implemented using Windows Workflow Foundation (WF). First, we propose an abstract description of WF workflows, and we formalise the extraction of Labelled Transition Systems from these workflows. Next, verification and adaptation are applied using respectively model-checkin...

Journal: :J. Network and Computer Applications 2001
Gail-Joon Ahn Kwangjo Kim

In role-based access control (RBAC), permissions are associated with roles and users are made members of appropriate roles, thereby acquiring the roles’ permissions. The principal motivation behind RBAC is to simplify administration. In this paper, we investigate one aspect of RBAC administration concerning assignment of users to roles. We introduce a constrained user-role assignment model, cal...

2004
Daniel Stødle Otto J. Anshus John Markus Bjørndalen

This paper investigates how one best can share windows between many different computers in a collaborative, cross platform environment. Current collaborative solutions offering users shared application access are limited in that they either share an entire desktop, or that sharing is built into the collaborative application. We present an architecture of a system allowing windows on MacOS X to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید