Sciweavers

1479 search results - page 132 / 296
» Management without (Detailed) Models
Sort
View
SACMAT
2006
ACM
14 years 4 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
VRML
1998
ACM
14 years 2 months ago
VSPLUS: A High-Level Multi-User Extension Library for Interactive VRML worlds
In this paper, we introduce the design and implementation of VSPLUS, a high-level multi-user extension library to enable people to simultaneously manipulate interactive VRML world...
Yoshiaki Araki
CSL
2002
Springer
13 years 10 months ago
Classical Linear Logic of Implications
Abstract. We give a simple term calculus for the multiplicative exponential fragment of Classical Linear Logic, by extending Barber and Plotkin's system for the intuitionistic...
Masahito Hasegawa
SENSYS
2004
ACM
14 years 3 months ago
Simulating the power consumption of large-scale sensor network applications
Developing sensor network applications demands a new set of tools to aid programmers. A number of simulation environments have been developed that provide varying degrees of scala...
Victor Shnayder, Mark Hempstead, Bor-rong Chen, Ge...
HICSS
2008
IEEE
135views Biometrics» more  HICSS 2008»
14 years 4 months ago
Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation
While executing a process, many decisions are taken at its various decision points for selecting paths. There is a need for understanding and analyzing on various paths that emana...
Sinnakkrishnan Perumal, Ambuj Mahanti