Sciweavers

354 search results - page 64 / 71
» On Obligations
Sort
View
SACMAT
2009
ACM
14 years 4 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
ACSC
2008
IEEE
14 years 4 months ago
On illegal composition of first-class agent interaction protocols
In this paper, we examine the composition of firstclass protocols for multi-agent systems. First-class protocols are protocols that exist as executable specifications that agent...
Tim Miller, Peter McBurney
ICCCN
2008
IEEE
14 years 4 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
VLDB
2007
ACM
114views Database» more  VLDB 2007»
14 years 3 months ago
IndeGS: Index Supported Graphics Data Server for CFD Data Postprocessing
Virtual reality techniques particularly in the field of CFD (computational fluid dynamics) are of growing importance due to their ability to offer comfortable means to interact...
Christoph Brochhaus, Thomas Seidl
3DGIS
2006
Springer
14 years 3 months ago
The Application of GIS in Maritime Boundary Delimitation
The Democratic Republic of Timor-Leste (East Timor) attained independence on 20 May 2002, marking its separation from Indonesia. As a newly independent country, East Timor is face...
I Made Andi Arsana, Chris Rizos, Clive Schofield