Sciweavers

523 search results - page 66 / 105
» A Formal Account of WS-BPEL
Sort
View
DBSEC
2007
138views Database» more  DBSEC 2007»
14 years 11 months ago
A Spatio-temporal Role-Based Access Control Model
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of su...
Indrakshi Ray, Manachai Toahchoodee
LREC
2008
89views Education» more  LREC 2008»
14 years 11 months ago
Lexical Resources for Automatic Translation of Constructed Neologisms: the Case Study of Relational Adjectives
This paper deals with the treatment of constructed neologisms in a machine translation system. It focuses on a particular issue in Romance languages: relational adjectives and the...
Bruno Cartoni
CMOT
2007
87views more  CMOT 2007»
14 years 9 months ago
Modeling centralized organization of organizational change
Organizations change with the dynamics of the world. To enable organizations to change, certain structures and capabilities are needed. As all processes, a change process has an or...
Mark Hoogendoorn, Catholijn M. Jonker, Martijn C. ...
TASE
2008
IEEE
14 years 9 months ago
Event-B Specification of a Situated Multi-Agent System: Study of a Platoon of Vehicles
Situated Multi-Agents Systems (MAS), and other Agentbased systems, are often complex. Formal reasoning is needed to ensuring their correctness and structuring their development. E...
Arnaud Lanoix
JCS
2007
103views more  JCS 2007»
14 years 9 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...