Sciweavers

17 search results - page 2 / 4
» Controlled Disclosure of Context Information across Ubiquito...
Sort
View
PCI
2009
Springer
13 years 10 months ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
JMLR
2008
124views more  JMLR 2008»
13 years 5 months ago
Learning Control Knowledge for Forward Search Planning
A number of today's state-of-the-art planners are based on forward state-space search. The impressive performance can be attributed to progress in computing domain independen...
Sung Wook Yoon, Alan Fern, Robert Givan
ISMB
2007
13 years 8 months ago
A Chado case study: an ontology-based modular schema for representing genome-associated biological information
Motivation: A few years ago, FlyBase undertook to design a new database schema to store Drosophila data. It would fully integrate genomic sequence and annotation data with bibliog...
Chris Mungall, David B. Emmert
PERVASIVE
2006
Springer
13 years 5 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz
SIGECOM
2009
ACM
216views ECommerce» more  SIGECOM 2009»
14 years 7 days ago
Approximate mechanism design without money
The literature on algorithmic mechanism design is mostly concerned with game-theoretic versions of optimization problems to which standard economic money-based mechanisms cannot b...
Ariel D. Procaccia, Moshe Tennenholtz