Sciweavers

1316 search results - page 28 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
FGCS
2008
159views more  FGCS 2008»
13 years 9 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
BMCBI
2004
151views more  BMCBI 2004»
13 years 9 months ago
A computational approach for ordering signal transduction pathway components from genomics and proteomics Data
Background: Signal transduction is one of the most important biological processes by which cells convert an external signal into a response. Novel computational approaches to mapp...
Yin Liu, Hongyu Zhao
MIDDLEWARE
2004
Springer
14 years 2 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
POLICY
2004
Springer
14 years 2 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
EURONGI
2005
Springer
14 years 2 months ago
An Afterstates Reinforcement Learning Approach to Optimize Admission Control in Mobile Cellular Networks
We deploy a novel Reinforcement Learning optimization technique based on afterstates learning to determine the gain that can be achieved by incorporating movement prediction inform...
José Manuel Giménez-Guzmán, J...