Sciweavers

533 search results - page 89 / 107
» Intensional Models for the Theory of Types
Sort
View
STORAGESS
2005
ACM
15 years 10 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
SACMAT
2003
ACM
15 years 9 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
ATAL
2003
Springer
15 years 9 months ago
Formal semantics and communication strategies for proactive information delivery among team-based agents
Effective human teams often benefit from proactivity through members’ capability of anticipating different needs of teammates. In this paper, we focus on three issues related...
John Yen, Xiaocong Fan, Shuang Sun, Rui Wang, Cong...
COMPGEOM
2010
ACM
15 years 9 months ago
Geometric tomography with topological guarantees
We consider the problem of reconstructing a compact 3manifold (with boundary) embedded in R3 from its crosssections with a given set of cutting planes having arbitrary orientation...
Omid Amini, Jean-Daniel Boissonnat, Pooran Memari
ACMICEC
2006
ACM
110views ECommerce» more  ACMICEC 2006»
15 years 8 months ago
Learning inventory management strategies for commodity supply chains with customer satisfaction
In this paper, we look at a supply chain of commodity goods where customer demand is uncertain and partly based on reputation, and where raw material replenishment is uncertain in...
Jeroen van Luin, Han La Poutré, J. Will M. ...