Sciweavers

148 search results - page 2 / 30
» Strong and Weak Policy Relations
Sort
View
HICSS
2008
IEEE
101views Biometrics» more  HICSS 2008»
14 years 1 days ago
The Value of Weak vs. Strong Ties between Individuals and Projects for New Product Review
This study extends the concept of weak and strong ties to the relationship between an individual and a project, in the context of a formal review process. Using data collected fro...
Lynne P. Cooper
ENTCS
1998
94views more  ENTCS 1998»
13 years 5 months ago
Derivation of Characteristic Formulae
This paper shows how modal mu-calculus formulae characterizing finite-state processes up to strong or weak bisimulation can be derived directly from the well-known greatest fixp...
Markus Müller-Olm
AAMAS
2005
Springer
13 years 5 months ago
Learning and Exploiting Relative Weaknesses of Opponent Agents
Agents in a competitive interaction can greatly benefit from adapting to a particular adversary, rather than using the same general strategy against all opponents. One method of s...
Shaul Markovitch, Ronit Reger
INFOCOM
2000
IEEE
13 years 10 months ago
Adaptive Leases: A Strong Consistency Mechanism for the World Wide Web
—In this paper, we argue that weak cache consistency mechanisms supported by existing Web proxy caches must be augmented by strong consistency mechanisms to support the growing d...
Venkata Duvvuri, Prashant J. Shenoy, Renu Tewari
SOUPS
2010
ACM
13 years 9 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley