Sciweavers

3725 search results - page 594 / 745
» DLP System Description
Sort
View
ICCS
2009
Springer
15 years 10 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
ISMIS
2009
Springer
15 years 10 months ago
Relational Sequence Clustering for Aggregating Similar Agents
Many clustering methods are based on flat descriptions, while data regarding real-world domains include heterogeneous objects related to each other in multiple ways. For instance,...
Grazia Bombini, Nicola Di Mauro, Stefano Ferilli, ...
SAT
2009
Springer
126views Hardware» more  SAT 2009»
15 years 10 months ago
Extending SAT Solvers to Cryptographic Problems
Cryptography ensures the confidentiality and authenticity of information but often relies on unproven assumptions. SAT solvers are a powerful tool to test the hardness of certain ...
Mate Soos, Karsten Nohl, Claude Castelluccia
CANDC
2009
ACM
15 years 10 months ago
Local issues, local uses: tools for robotics and sensing in community contexts
This paper describes six creativity support tools we developed to foster community engagement and expression with robotics and sensing, assessing the benefits and shortcomings of ...
Carl F. DiSalvo, Marti Louw, Julina Coupland, Mary...
DEBS
2009
ACM
15 years 10 months ago
Distributed agent environments in the Ambient Event Calculus
We study the development of distributed agent environments as distributed event-based systems specified in the Ambient Event Calculus (AEC). The AEC is a logic-based formalism th...
Stefano Bromuri, Kostas Stathis