Sciweavers

4737 search results - page 893 / 948
» The LOGIC negotiation model
Sort
View
166
Voted
TDSC
2008
152views more  TDSC 2008»
15 years 3 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
153
Voted
CCE
2005
15 years 3 months ago
Logic-based outer approximation for globally optimal synthesis of process networks
Process network problems can be formulated as Generalized Disjunctive Programs where a logicbased representation is used to deal with the discrete and continuous decisions. A new ...
María Lorena Bergamini, Pío A. Aguir...
119
Voted
JUCS
2007
95views more  JUCS 2007»
15 years 3 months ago
A First Step Mapping IMS Learning Design and Moodle
: Mapping the specification IMS Learning Design and the Course Management System Moodle is a logical step forward on interoperability between eLearning systems and specifications i...
Daniel Burgos, Colin Tattersall, Martin Dougiamas,...
152
Voted
TWC
2008
153views more  TWC 2008»
15 years 3 months ago
Improved Resource Management through User Aggregation in Heterogeneous Multiple Access Wireless Networks
Abstract--In this letter we discuss the exploitation of aggregated mobility patterns in mobile networks including heterogeneous multiple access techniques. We advocate the use of k...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
CJ
2004
105views more  CJ 2004»
15 years 3 months ago
Generalized Template Splay: A Basic Theory and Calculus
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
George F. Georgakopoulos, David J. McClurkin