Sciweavers

224 search results - page 31 / 45
» A General Methodology For The Development Of An Effective In...
Sort
View
AIPS
2003
13 years 9 months ago
A Framework for Planning in Continuous-time Stochastic Domains
We propose a framework for policy generation in continuoustime stochastic domains with concurrent actions and events of uncertain duration. We make no assumptions regarding the co...
Håkan L. S. Younes, David J. Musliner, Reid ...
INFOCOM
2008
IEEE
14 years 2 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
SACMAT
2009
ACM
14 years 2 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
IV
2000
IEEE
107views Visualization» more  IV 2000»
14 years 6 days ago
Ideograms in Polyscopic Modeling
“addiction” is defined as a pattern (abstract relationship). Such definition allows us to look in a new way at a number of cultural issues including the values, the lifestyl...
Dino Karabeg
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu