Sciweavers

948 search results - page 146 / 190
» What can we achieve by arbitrary announcements
Sort
View
ISW
2005
Springer
14 years 2 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
STAIRS
2008
128views Education» more  STAIRS 2008»
13 years 10 months ago
Towards Social Dynamic Dependence Networks for Institutions
Social networks are structures that aim to represent the relationships among the actors of a society. In the multiagent model, these networks depict the dependencies among the agen...
Serena Villata
ECIS
2004
13 years 10 months ago
A study of information systems outsourcing risks
Despite the considerable growth of Information Systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the ...
Reyes-G. Gonzalez, Jose Gasco, Juan Llopis
SCS
2004
13 years 10 months ago
Complex Reactive Real Time Systems and the Safety Case
Complex reactive real time systems are systems of systems that interact with the external world to perform selections of tasks in real time. They may be required to carry out sele...
Gordon R. Stone
VCIP
2000
124views Communications» more  VCIP 2000»
13 years 10 months ago
Rendering of 3D-wavelet-compressed concentric mosaic scenery with progressive inverse wavelet synthesis (PIWS)
The concentric mosaics offer a quick solution to the construction and navigation of a virtual environment. To reduce the vast data amount of the concentric mosaics, a compression ...
Yunnan Wu, Lin Luo, Jin Li, Ya-Qin Zhang