Sciweavers

1627 search results - page 99 / 326
» On context in authorization policy
Sort
View
SDMW
2007
Springer
14 years 4 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
ATAL
2003
Springer
14 years 4 months ago
Emergent properties of referral systems
Agents must decide with whom to interact, which is nontrivial when no central directories are available. A classical decentralized approach is referral systems, where agents adapt...
Pinar Yolum, Munindar P. Singh
ESWS
2007
Springer
14 years 2 months ago
Web Service Contracting: Specification and Reasoning with SCIFF
The semantic web vision will facilitate automation of many tasks, including the location and dynamic reconfiguration of web services. In this article, we are concerned with a speci...
Marco Alberti, Federico Chesani, Marco Gavanelli, ...
AI
1999
Springer
13 years 10 months ago
Learning Action Strategies for Planning Domains
There are many different approaches to solving planning problems, one of which is the use of domain specific control knowledge to help guide a domain independent search algorithm. ...
Roni Khardon
SIGMETRICS
1998
ACM
14 years 3 months ago
Scheduling Policies to Support Distributed 3D Multimedia Applications
We consider the problem of scheduling tasks with unpredictable service times on distinct processing nodes so as to meet a real-time deadline, given that all communication among no...
Thu D. Nguyen, John Zahorjan