Sciweavers

1401 search results - page 236 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
Reduction of quality (RoQ) attacks on Internet end-systems
— Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairnes...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
ITSL
2008
13 years 10 months ago
A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact
In this paper we present a randomized complexity theoretic model for those epidemics propagated via short-distance close contact. We prove that the contact-based epidemics problems...
Zhen Cao, Jiejun Kong, Mario Gerla, Dapeng Wu
SIGUCCS
2003
ACM
14 years 1 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
CIA
2000
Springer
14 years 1 months ago
Auction-Based Agent Negotiation via Programmable Tuple Spaces
Auctions are proposed as a distributed negotiation mean, particularly useful in multiagent systems where both cooperative and self-interested agents compete for resources and serv...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
ICONIP
2007
13 years 10 months ago
Finding Exploratory Rewards by Embodied Evolution and Constrained Reinforcement Learning in the Cyber Rodents
The aim of the Cyber Rodent project [1] is to elucidate the origin of our reward and affective systems by building artificial agents that share the natural biological constraints...
Eiji Uchibe, Kenji Doya