Sciweavers

25316 search results - page 4796 / 5064
» Computational sensor networks
Sort
View
POLICY
2005
Springer
15 years 9 months ago
Deriving Semantic Models from Privacy Policies
Natural language policies describe interactions between and across organizations, third-parties and individuals. However, current policy languages are limited in their ability to ...
Travis D. Breaux, Annie I. Antón
POLICY
2005
Springer
15 years 9 months ago
Embedding Policy Rules for Software-Based Systems in a Requirements Context
Policy rules define what behavior is desired in a softwarebased system, they do not describe the corresponding action and event sequences that actually “produce” desired (“...
Mark Strembeck
POLICY
2005
Springer
15 years 9 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...
RAID
2005
Springer
15 years 9 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
ROBOCUP
2005
Springer
109views Robotics» more  ROBOCUP 2005»
15 years 9 months ago
Using the Max-Plus Algorithm for Multiagent Decision Making in Coordination Graphs
Abstract. Coordination graphs offer a tractable framework for cooperative multiagent decision making by decomposing the global payoff function into a sum of local terms. Each age...
Jelle R. Kok, Nikos A. Vlassis
« Prev « First page 4796 / 5064 Last » Next »