Sciweavers

352 search results - page 60 / 71
» Role-based Access Control on the Web Using LDAP
Sort
View
ICFP
2005
ACM
14 years 8 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...
CBMS
2007
IEEE
14 years 3 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
GLOBECOM
2007
IEEE
14 years 3 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
IEEEARES
2008
IEEE
14 years 3 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
ATAL
2006
Springer
13 years 10 months ago
Autonomous agents for air-traffic deconfliction
This contribution presents a deployment exercise of multiagent technology in the domain of deconflicted air-traffic control among several autonomous aerial vehicles (manned as wel...
Michal Pechoucek, David Sislák, Dusan Pavl&...