Sciweavers

653 search results - page 76 / 131
» Addressing interoperability issues in access control models
Sort
View
128
Voted
IROS
2006
IEEE
143views Robotics» more  IROS 2006»
15 years 8 months ago
A New Method of Executing Multiple Auxiliary Tasks by Redundant Nonholonomic Mobile Manipulators
— This paper addresses the multiple tasks performing issues for redundant nonholonomic mobile manipulators. An extended gradient projection redundancy resolution scheme is propos...
Yugang Liu, Yangmin Li
128
Voted
OTM
2005
Springer
15 years 8 months ago
Balancing Flexibility and Security in Adaptive Process Management Systems
Abstract. Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to thi...
Barbara Weber, Manfred Reichert, Werner Wild, Stef...
133
Voted
DEON
2008
Springer
15 years 4 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
118
Voted
JCM
2006
86views more  JCM 2006»
15 years 2 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
102
Voted
IJCAI
2003
15 years 4 months ago
On Identifying and Managing Relationships in Multi-Agent Systems
Multi-agent systems result from interactions between individual agents. Through these interactions different kinds of relationships are formed, which can impact substantially on t...
Ronald Ashri, Michael Luck, Mark d'Inverno