146   Artículos

 
en línea
Abner Perez-Haro and Arturo Diaz-Perez    
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Minghao Liu, Qingxi Luo, Jianxiang Wang, Lingbo Sun, Tingting Xu and Enming Wang    
Land use/cover change (LUCC) refers to the phenomenon of changes in the Earth?s surface over time. Accurate prediction of LUCC is crucial for guiding policy formulation and resource management, contributing to the sustainable use of land, and maintaining... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon    
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Bao She, Jiating Hu, Linsheng Huang, Mengqi Zhu and Qishuo Yin    
To grasp the spatial distribution of soybean planting areas in time is the prerequisite for the work of growth monitoring, crop damage assessment and yield estimation. The research on remote sensing identification of soybean conducted in China mainly foc... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Lihan Chen, Lihong Xu and Ruihua Wei    
Due to the complex coupling of greenhouse environments, a number of challenges have been encountered in the research of automatic control in Venlo greenhouses. Most algorithms are only concerned with accuracy, yet energy-saving control is of great import... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Szabolcs Deák, Paul Levine, Joseph Pearlman and Bo Yang    
We construct a New Keynesian (NK) behavioural macroeconomic model with bounded-rationality (BR) and heterogeneous agents. We solve and simulate the model using a third-order approximation for a given policy and evaluate its properties using this solution... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Huaixi Xing, Qinghua Xing and Kun Wang    
Current electronic warfare jammers and radar countermeasures are characterized by dynamism and uncertainty. This paper focuses on a decision-making framework of radar anti-jamming countermeasures. The characteristics and implementation process of radar i... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Sirui Chen, Yuming Tian and Lingling An    
Order scheduling is of a great significance in the internet and communication industries. With the rapid development of the communication industry and the increasing variety of user demands, the number of work orders for communication operators has grown... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Hee Jun Ryu, Ye Na Jo, Won Jun Lee, Ji Won Cheong, Boo Yong Moon and Young Dae Ko    
The efficient management of social worker personnel is important since it involves a huge portion in its operations. However, the burnout and turnover rates of social workers are very high, which is due to dissatisfaction with the irregular and unequal s... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 10     Siguiente »