Sciweavers

126 search results - page 23 / 26
» Centrality in Policy Network Drawings
Sort
View
SACMAT
2003
ACM
14 years 22 days ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
WWW
2002
ACM
14 years 8 months ago
A pragmatic application of the semantic web using SemTalk
The Semantic Web is a new layer of the Internet that enables semantic representation of the contents of existing web pages. Using common ontologies, human users sketch out the mos...
Christian Fillies, Gay Wood-Albrecht, Frauke Weich...
ATAL
2005
Springer
14 years 1 months ago
A comparative evaluation of agent location mechanisms in large scale MAS
Agents in open multi-agent systems (MAS) need means for locating other agents with which they may collaborate. To address this need, several agent location mechanisms were suggest...
David Ben-Ami, Onn Shehory
SASN
2003
ACM
14 years 22 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
WOSP
2004
ACM
14 years 27 days ago
Early performance testing of distributed software applications
Performance characteristics, such as response time, throughput and scalability, are key quality attributes of distributed applications. Current practice, however, rarely applies s...
Giovanni Denaro, Andrea Polini, Wolfgang Emmerich