Sciweavers

533 search results - page 89 / 107
» Intensional Models for the Theory of Types
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is ļ¬rst stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
SACMAT
2003
ACM
14 years 27 days ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
ATAL
2003
Springer
14 years 27 days ago
Formal semantics and communication strategies for proactive information delivery among team-based agents
Eļ¬€ective human teams often beneļ¬t from proactivity through membersā€™ capability of anticipating diļ¬€erent needs of teammates. In this paper, we focus on three issues related...
John Yen, Xiaocong Fan, Shuang Sun, Rui Wang, Cong...
COMPGEOM
2010
ACM
14 years 22 days ago
Geometric tomography with topological guarantees
We consider the problem of reconstructing a compact 3manifold (with boundary) embedded in R3 from its crosssections with a given set of cutting planes having arbitrary orientation...
Omid Amini, Jean-Daniel Boissonnat, Pooran Memari
ACMICEC
2006
ACM
110views ECommerce» more  ACMICEC 2006»
13 years 11 months ago
Learning inventory management strategies for commodity supply chains with customer satisfaction
In this paper, we look at a supply chain of commodity goods where customer demand is uncertain and partly based on reputation, and where raw material replenishment is uncertain in...
Jeroen van Luin, Han La Poutré, J. Will M. ...