Sciweavers

1627 search results - page 182 / 326
» On context in authorization policy
Sort
View
IAT
2010
IEEE
13 years 8 months ago
Multiagent Meta-level Control for a Network of Weather Radars
It is crucial for embedded systems to adapt to the dynamics of open environments. This adaptation process becomes especially challenging in the context of multiagent systems. In t...
Shanjun Cheng, Anita Raja, Victor R. Lesser
MEDES
2010
ACM
13 years 5 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
ICFP
2005
ACM
14 years 10 months ago
A unified category-theoretic formulation of typed binding signatures
We generalise Fiore et al's account of variable binding for untyped cartesian contexts and Tanaka's account of variable binding for untyped linear contexts to give an ac...
Miki Tanaka, John Power
SAGA
2009
Springer
14 years 4 months ago
Bounds for Multistage Stochastic Programs Using Supervised Learning Strategies
We propose a generic method for obtaining quickly good upper bounds on the minimal value of a multistage stochastic program. The method is based on the simulation of a feasible dec...
Boris Defourny, Damien Ernst, Louis Wehenkel
INFOCOM
2006
IEEE
14 years 4 months ago
Capacity of Wireless Data Networks with Intra- and Inter-Cell Mobility
— The performance of wireless data systems has been thoroughly studied in the context of a single base station. In the present paper we analyze networks with several interacting ...
Sem C. Borst, Alexandre Proutiére, Nidhi He...