Sciweavers

432 search results - page 67 / 87
» Autonomous functional configuration of a network robot syste...
Sort
View
SACMAT
2005
ACM
15 years 3 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
ICDE
2006
IEEE
132views Database» more  ICDE 2006»
15 years 3 months ago
Treatment of Rules in Individual Metadata of Flexible Contents Management
The properties of contents stored in a computer system are very wide while the data volume treated in the system becomes very large. It is important to treat each stored object in...
Kensuke Ohta, Dai Kobayashi, Takashi Kobayashi, Ry...
ATAL
2010
Springer
14 years 10 months ago
Intelligent agents for the smart grid
The Intelligent Decentralised Energy-Aware Systems (iDEaS) project at the University of Southampton (see www.ideasproject.info) is developing and demonstrating the application of ...
Perukrishnen Vytelingum, Thomas Voice, Sarvapali D...
POLICY
2001
Springer
15 years 2 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
ICAC
2006
IEEE
15 years 3 months ago
Collaborative Self-Organization by Devices Providing Document Services - A Multi-Agent Perspective
— In a service oriented environment such as the realm of document services, the conventional notion is that of a multi-function device interacting individually with customer appl...
Nathan Gnanasambandam, Naveen Sharma, Soundar R. T...