Sciweavers

481 search results - page 58 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
ICWE
2004
Springer
14 years 2 months ago
Reliable and Adaptable Security Engineering for Database-Web Services
The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security managem...
Martin Wimmer, Daniela Eberhardt, Pia Ehrnlechner,...
LREC
2010
143views Education» more  LREC 2010»
13 years 10 months ago
Language Service Management with the Language Grid
As the number of language resources accessible on the Internet increases, many efforts have been made for combining language resources and language processing tools to create new ...
Yohei Murakami, Donghui Lin, Masahiro Tanaka, Taka...
CDC
2008
IEEE
139views Control Systems» more  CDC 2008»
14 years 3 months ago
Human-in-the-loop vehicle routing policies for dynamic environments
— In this paper we design coordination policies for a routing problem requiring human-assisted classification of targets through analysis of information gathered on-site by auto...
Ketan Savla, Tom Temple, Emilio Frazzoli
MONET
2006
145views more  MONET 2006»
13 years 8 months ago
Efficient Resource Allocation for Policy-Based Wireless/Wireline Interworking
Abstract This paper proposes efficient resource allocation techniques for a policy-based wireless/wireline interworking architecture, where quality of service (QoS) provisioning an...
Yu Cheng, Wei Song, Weihua Zhuang, Alberto Leon-Ga...
PODC
2005
ACM
14 years 2 months ago
Advanced contention management for dynamic software transactional memory
The obstruction-free Dynamic Software Transactional Memory (DSTM) system of Herlihy et al. allows only one transaction at a time to acquire an object for writing. Should a second ...
William N. Scherer III, Michael L. Scott