Sciweavers

954 search results - page 75 / 191
» On Controlled Flexibility
Sort
View
120
Voted
IQ
2001
15 years 4 months ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik
151
Voted
ICICS
2010
Springer
15 years 1 months ago
Fine-Grained Disclosure of Access Policies
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
123
Voted
CSCWD
2008
Springer
15 years 5 months ago
Authorization approaches for advanced permission-role assignments
Role-based access control (RBAC) has been proven to be a flexible and useful access control model for information sharing in distributed collaborative environments. Permission-rol...
Hua Wang, Jianming Yong, Jiuyong Li, Min Peng
ATAL
2008
Springer
15 years 5 months ago
SmartBody: behavior realization for embodied conversational agents
Researchers demand much from their embodied conversational agents (ECAs), requiring them to be both life-like, as well as responsive to events in an interactive setting. We find t...
Marcus Thiébaux, Stacy Marsella, Andrew N. ...
150
Voted
TON
2010
157views more  TON 2010»
14 years 10 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle