Sciweavers

480 search results - page 34 / 96
» policy 2004
Sort
View
SACMAT
2004
ACM
14 years 1 months ago
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...
Xuhui Ao, Naftaly H. Minsky
ECIS
2004
13 years 9 months ago
Hungarian IT: Coping with Economic Transition and Globalisation
This paper examines the impact of economic transition on the information technology industry in Hungary. It highlights some of the challenges faced by policy makers and businesses...
G. Harindranath
GECCO
2004
Springer
14 years 1 months ago
Modeling Selection Intensity for Toroidal Cellular Evolutionary Algorithms
We present quantitative models for the selection pressure of cellular evolutionary algorithms structured in two dimensional regular lattices. We derive models based on probabilisti...
Mario Giacobini, Enrique Alba, Andrea Tettamanzi, ...
IPTPS
2004
Springer
14 years 1 months ago
Peer-to-Peer Authentication with a Distributed Single Sign-On Service
Abstract. CorSSO is a distributed service for authentication in networks. It allows application servers to delegate client identity checking to combinations of authentication serve...
William K. Josephson, Emin Gün Sirer, Fred B....
ATAL
2004
Springer
14 years 1 months ago
Best-Response Multiagent Learning in Non-Stationary Environments
This paper investigates a relatively new direction in Multiagent Reinforcement Learning. Most multiagent learning techniques focus on Nash equilibria as elements of both the learn...
Michael Weinberg, Jeffrey S. Rosenschein