Sciweavers

653 search results - page 76 / 131
» Addressing interoperability issues in access control models
Sort
View
IROS
2006
IEEE
143views Robotics» more  IROS 2006»
14 years 2 months ago
A New Method of Executing Multiple Auxiliary Tasks by Redundant Nonholonomic Mobile Manipulators
— This paper addresses the multiple tasks performing issues for redundant nonholonomic mobile manipulators. An extended gradient projection redundancy resolution scheme is propos...
Yugang Liu, Yangmin Li
OTM
2005
Springer
14 years 1 months ago
Balancing Flexibility and Security in Adaptive Process Management Systems
Abstract. Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to thi...
Barbara Weber, Manfred Reichert, Werner Wild, Stef...
DEON
2008
Springer
13 years 10 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
JCM
2006
86views more  JCM 2006»
13 years 8 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
IJCAI
2003
13 years 9 months ago
On Identifying and Managing Relationships in Multi-Agent Systems
Multi-agent systems result from interactions between individual agents. Through these interactions different kinds of relationships are formed, which can impact substantially on t...
Ronald Ashri, Michael Luck, Mark d'Inverno