Sciweavers

1401 search results - page 98 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
SOSP
1997
ACM
13 years 10 months ago
A Decentralized Model for Information Flow Control
This paper presents a new model for controlling information flow in systems with mutual distrust and decentralized authority. The model allows users to share information with dis...
Andrew C. Myers, Barbara Liskov
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Impact of Information Technology on the Temporal Optimization of Supply Chain Performance
The objective of this paper is to suggest a systematic means by which the timing and focus of information technology policies can be used to optimize supply chain performance and ...
Ken Dozier, David Chang
HICSS
2002
IEEE
179views Biometrics» more  HICSS 2002»
14 years 1 months ago
Combined Modeling with Multi-agent Systems and Simulation: Its Application to Harbor Supply Chain Management
This paper presents a method for modeling the dynamic behavior of harbor supply chains and evaluating strategic and operational policies of the proposed harbor supply chain by app...
Dong Won Yi, Soung Hie Kim, Nak Hyun Kim
CAV
2009
Springer
116views Hardware» more  CAV 2009»
14 years 1 months ago
Priority Scheduling of Distributed Systems Based on Model Checking
Priorities are used to control the execution of systems to meet given requirements for optimal use of resources, e.g., by using scheduling policies. For distributed systems, it is ...
Ananda Basu, Saddek Bensalem, Doron Peled, Joseph ...
ICANN
2005
Springer
14 years 2 months ago
Combining Attention and Value Maps
We present an approach where we combine attention with value maps for the purpose of acquiring a decision-making policy for multiple concurrent goals. The former component is essen...
Stathis Kasderidis, John G. Taylor