Sciweavers

2261 search results - page 378 / 453
» Dynamic types for authentication
Sort
View
SAJ
2000
129views more  SAJ 2000»
13 years 8 months ago
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments
The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever...
Stephen Perelson, Reinhardt A. Botha
SIAMAM
2000
71views more  SIAMAM 2000»
13 years 8 months ago
Wave-Block in Excitable Media Due to Regions of Depressed Excitability
We study propagation failure using the one-dimensional scalar bistable equation with a passive "gap" region. By applying comparison principles for this type of equation, ...
James P. Keener, Timothy J. Lewis
IJCIA
2002
137views more  IJCIA 2002»
13 years 8 months ago
Co-Evolution in Social Interactions
An interesting problem which has been widely investigated is under what circumstances will a society of rational agents realize some particular stable situations, and whether they ...
Hiroshi Sato, Akira Namatame
AEI
1999
120views more  AEI 1999»
13 years 8 months ago
Genetic algorithms for designing multihop lightwave network topologies
Multihop lightwave networks are a means of utilizing the large bandwidth of optical fibers. In these networks, each node has a fixed number of transmitters and receivers connected...
Cenk Gazen, Cem Ersoy
AMAI
1999
Springer
13 years 8 months ago
From Logic Programming Towards Multi-Agent Systems
In this paper we present an extension of logic programming (LP) that is suitable not only for the "rational" component of a single agent but also for the "reactive&...
Robert A. Kowalski, Fariba Sadri