Sciweavers

5339 search results - page 84 / 1068
» Controllable Delay-Insensitive Processes
Sort
View
IWFM
2000
167views Formal Methods» more  IWFM 2000»
13 years 11 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 5 months ago
Composition of Management System for Smart Homes
—The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm...
Mark Sh. Levin, Aliaksei Andrushevich, Alexander K...
RECOMB
2004
Springer
14 years 10 months ago
Probabilistic discovery of overlapping cellular processes and their regulation
In this paper, we explore modeling overlapping biological processes. We discuss a probabilistic model of overlapping biological processes, gene membership in those processes, and ...
Alexis Battle, Eran Segal, Daphne Koller
FDL
2004
IEEE
14 years 1 months ago
Semi-Symbolic Modeling and Analysis of Noise in Heterogeneous Systems
The article describes semi-symbolic methods for the analysis of control and signal processing systems, including static and dynamic uncertainties. This above mentioned semi-symbol...
Christoph Grimm, Wilhelm Heupke, Klaus Waldschmidt
ADC
2006
Springer
135views Database» more  ADC 2006»
14 years 4 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...