Sciweavers

596 search results - page 14 / 120
» Theories of Access Consciousness
Sort
View
IS
2006
13 years 7 months ago
Composition of Semantic Web services using Linear Logic theorem proving
This paper introduces a method for automatic composition of Semantic Web services using Linear Logic (LL) theorem proving. The method uses a Semantic Web service language (DAML-S)...
Jinghai Rao, Peep Küngas, Mihhail Matskin
GG
2004
Springer
14 years 23 days ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
IEPOL
2006
67views more  IEPOL 2006»
13 years 7 months ago
Platform competition and broadband uptake: Theory and empirical evidence from the European union
Broadband access provides users with high speed, always-on connectivity to the Internet. Due to its superiority, broadband is seen as the way for consumers and firms to exploit th...
Walter Distaso, Paolo Lupi, Fabio M. Manenti
TON
2010
157views more  TON 2010»
13 years 2 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
JOLLI
2010
92views more  JOLLI 2010»
13 years 5 months ago
A Theory of Hierarchical Consequence and Conditionals
We introduce A-ranked preferential structures and combine them with an accessibility relation. A-ranked preferential structures are intermediate between simple preferential struct...
Dov M. Gabbay, Karl Schlechta