Sciweavers

5790 search results - page 79 / 1158
» Distributed programming with distributed authorization
Sort
View
AMC
2005
87views more  AMC 2005»
13 years 9 months ago
The distribution models of grazing animals between two grassland resource points
In this paper, by using theories of stochastic process and differential equation, the authors systematically studied the distribution of grazing animals between two resource point...
Weiming Wang, Zhenqing Li
EVOW
2009
Springer
14 years 3 months ago
Stochastic Local Search Techniques with Unimodal Continuous Distributions: A Survey
In continuous black-box optimization, various stochastic local search techniques are often employed, with various remedies for fighting the premature convergence. This paper surve...
Petr Posík
CCS
2010
ACM
14 years 3 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
VLDB
2007
ACM
154views Database» more  VLDB 2007»
14 years 3 months ago
P2P Authority Analysis for Social Communities
PageRank-style authority analyses of Web graphs are of great importance for Web mining. Such authority analyses also apply to hot “Web 2.0” applications that exhibit a natural...
Josiane Xavier Parreira, Sebastian Michel, Matthia...
PERCOM
2005
ACM
14 years 8 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz