Sciweavers

977 search results - page 1 / 196
» Soft Constraints for Security
Sort
View
AGENTS
2000
Springer
13 years 9 months ago
Design-to-Criteria Scheduling: Real-Time Agent Control
Design-to-Criteria builds custom schedules for agents that meet hard temporal constraints, hard resource constraints, and soft constraints stemming from soft task interactions or ...
Thomas Wagner, Victor R. Lesser
IFIP
2004
Springer
13 years 10 months ago
Reasoning about Secure Interoperation Using Soft Constraints
Abstract The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for sy...
Stefano Bistarelli, Simon N. Foley, Barry O'Sulliv...
ENTCS
2006
89views more  ENTCS 2006»
13 years 4 months ago
Soft Constraints for Security
Giampaolo Bella, Stefano Bistarelli, Simon N. Fole...
CP
2009
Springer
14 years 5 months ago
SOGgy Constraints: Soft Open Global Constraints
We investigate soft open constraints. We generalize and unify classes of soft constraints and adapt them to the open setting. We give sufficient conditions for generalized classes ...
Michael J. Maher
AGENTS
2001
Springer
13 years 9 months ago
Implementing soft real-time agent control
Real-time control has become increasingly important as technologies are moved from the lab into real world situations. The complexity associated with these systems increases as co...
Régis Vincent, Bryan Horling, Victor R. Les...