Sciweavers

579 search results - page 103 / 116
» Policies, Models, and Languages for Access Control
Sort
View
AAAI
2008
13 years 10 months ago
Perpetual Learning for Non-Cooperative Multiple Agents
This paper examines, by argument, the dynamics of sequences of behavioural choices made, when non-cooperative restricted-memory agents learn in partially observable stochastic gam...
Luke Dickens
ICLP
1999
Springer
13 years 11 months ago
Concurrency in Prolog Using Threads and a Shared Database
Concurrency in Logic Programming has received much attention in the past. One problem with many proposals, when applied to Prolog, is that they involve large modifications to the...
Manuel Carro, Manuel V. Hermenegildo
IAAI
2001
13 years 9 months ago
CARMA: A Case-Based Range Management Advisor
: CARMA is an advisory system for rangeland grasshopper infestations that demonstrates how AI technology can deliver expert advice to compensate for cutbacks in public services. CA...
Karl Branting, John D. Hastings, Jeffrey A. Lockwo...
ICECCS
2007
IEEE
154views Hardware» more  ICECCS 2007»
14 years 1 months ago
A light-weight static approach to analyzing UML behavioral properties
Identifying and resolving design problems in the early design phase can help ensure software quality and save costs. There are currently few tools for analyzing designs expressed ...
Lijun Yu, Robert B. France, Indrakshi Ray, Kevin L...
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 9 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...