Sciweavers

189 search results - page 10 / 38
» Learning Automation Policies for Pervasive Computing Environ...
Sort
View
DIS
2007
Springer
14 years 3 months ago
Machine Learning in Ecosystem Informatics
Ecosystem Informatics brings together mathematical and computational tools to address scientific and policy challenges in the ecosystem sciences. These challenges include novel s...
Thomas G. Dietterich
SDMW
2004
Springer
14 years 2 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...
POLICY
2001
Springer
14 years 1 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
MM
2005
ACM
150views Multimedia» more  MM 2005»
14 years 2 months ago
Reading SCORM compliant multimedia courses using heterogeneous pervasive devices
The Sharable Content Object Reference Model (SCORM) provides some important representation for distance learning content and the learning behavior. In general, SCORM-Compliant lea...
Te-Hua Wang, Hsuan-Pu Chang, Yun-Long Sie, Kun-Han...
CONTEXT
2003
Springer
14 years 2 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...