■ Proactive interference (PI), which is formed through repetition of certain behavior and lasts for a while, needs to be inhibited in order for subsequent behavior to prevail ov...
Seiki Konishi, Takamitsu Watanabe, Koji Jimura, Ju...
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
: Copy avoidance refers to the safe replacement, at compile time, of copying operations by destructive updates in single-assignment languages. Conceptually, the problem can be divi...
Abstract Role-based access control RBAC has recently received a lot of attention due to its exibility, expressive power and simplicity in administration. In RBAC permissions are as...
During workflow design, workflow modelers generally specify the performers of a task by their organizational role. However, during workflow enactment, numerous workers with differ...