Sciweavers

147 search results - page 9 / 30
» Autonomy with Regard to an Attribute
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
SSDBM
2007
IEEE
116views Database» more  SSDBM 2007»
14 years 1 months ago
A Distributed Algorithm for Joins in Sensor Networks
Given their autonomy, flexibility and large range of functionality, wireless sensor networks can be used as an effective and discrete means for monitoring data in many domains. T...
Alexandru Coman, Mario A. Nascimento
ALIFE
2010
13 years 6 months ago
Modeling Social Learning of Language and Skills
We present a model of social learning of both language and skills, while assuming—insofar as possible—strict autonomy, virtual embodiment, and situatedness. This model is built...
Paul Vogt, Evert Haasdijk
CHI
2010
ACM
14 years 4 hour ago
Share: a programming environment for loosely bound cooperation
We introduce a programming environment entitled Share that is designed to encourage loosely bound cooperation between individuals within communities of practice through the sharin...
Yannick Assogba, Judith S. Donath
WSC
2004
13 years 9 months ago
Military Applications of Agent-Based Simulations
There continues to be increasing interest from a broad range of disciplines in agent-based and artificial life simulations. This includes the Department of Defense--which uses sim...
Thomas M. Cioppa, Thomas W. Lucas, Susan M. Sanche...