Sciweavers

1764 search results - page 333 / 353
» Information granules and entropy theory in information syste...
Sort
View
SACMAT
2005
ACM
14 years 1 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
SPAA
2003
ACM
14 years 23 days ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
ATAL
2003
Springer
14 years 23 days ago
Behaviors that emerge from emotion and cognition: implementation and evaluation of a symbolic-connectionist architecture
This paper describes the implementation and evaluation of a framework for modeling emotions in complex, decision-making agents. Sponsored by U.S. Army Research Institute (ARI), th...
Amy E. Henninger, Randolph M. Jones, Eric Chown
CRYPTO
2000
Springer
151views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
New Public-Key Cryptosystem Using Braid Groups
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups ca...
Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo...
ISER
1995
Springer
100views Robotics» more  ISER 1995»
13 years 11 months ago
Distributed Robotic Manipulation: Experiments in Minimalism
Minimalism pursues the following agenda: For a given robotics task, nd the minimal con guration of resources required to solve the task. Thus, minimalism attempts to reduce the re...
Karl-Friedrich Böhringer, Russell Brown, Bruc...