Sciweavers

3199 search results - page 598 / 640
» Variability in Automation System Models
Sort
View
WCE
2007
13 years 11 months ago
Constrained Path Optimisation for Underground Mine Layout
Abstract—The major infrastructure component required to develop an underground mine is a decline, which is a system of tunnels used for access and haulage. In this paper we study...
Marcus Brazil, P. A. Grossman, D. H. Lee, J. H. Ru...
CAISE
2010
Springer
13 years 10 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
CONCURRENCY
2008
102views more  CONCURRENCY 2008»
13 years 10 months ago
Dynamic data replication in LCG 2008
To provide performant access to data from high energy physics experiments such as the Large Hadron Collider (LHC), controlled replication of files among grid sites is required. Dy...
Caitriana Nicholson, David G. Cameron, A. T. Doyle...
ISEM
2008
129views more  ISEM 2008»
13 years 10 months ago
User requirements of mobile technology: results from a content analysis of user reviews
Advanced mobile technology continues to shape professional environments. Smart cell phones, pocket computers and laptop computers reduce the need of users to remain close to a wir...
Judith Gebauer, Ya Tang, Chaiwat Baimai
CJ
2004
105views more  CJ 2004»
13 years 10 months ago
Generalized Template Splay: A Basic Theory and Calculus
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
George F. Georgakopoulos, David J. McClurkin