Sciweavers

5252 search results - page 900 / 1051
» Logic in Access Control
Sort
View
ISSA
2004
15 years 5 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
IAAI
2001
15 years 5 months ago
CARMA: A Case-Based Range Management Advisor
: CARMA is an advisory system for rangeland grasshopper infestations that demonstrates how AI technology can deliver expert advice to compensate for cutbacks in public services. CA...
Karl Branting, John D. Hastings, Jeffrey A. Lockwo...
ECSCW
2003
15 years 5 months ago
Moving to get aHead: Local Mobility and Collaborative Work
: Local mobility is a central aspect of collaborative work that is in need of close analysis. Between the face-to-face interaction of offices or control rooms and longdistance inte...
Jakob E. Bardram, Claus Bossen
GEOINFO
2003
15 years 5 months ago
The Architecture of a Mobile Emergency Plan Deployment System
This paper describes the implementation of a workflow management system to support mobile GIS workgroup applications and highlights the design of the workflow definition language t...
Fábio Meira de Oliveira Dias, Marcelo T&iac...
MASCOTS
2001
15 years 5 months ago
Improving Ensemble-TCP Performance on Asymmetric Networks
For the World Wide Web, the Transmission Control Protocol (TCP) and the HyperText Transfer Protocol (HTTP) are two important protocols. However, interactions between these two pro...
Qian Wu, Carey L. Williamson