Sciweavers

1615 search results - page 184 / 323
» Computer science and decision theory
Sort
View
CSE
2009
IEEE
15 years 7 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
98
Voted
ACSC
2008
IEEE
15 years 7 months ago
Product flow analysis in distribution networks with a fixed time horizon
The movement of items through a product distribution network is a complex dynamic process which depends not only on the network’s static topology but also on a knowledge of how ...
Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter...
107
Voted
SOFSEM
2007
Springer
15 years 7 months ago
Incremental Learning of Planning Operators in Stochastic Domains
In this work we assume that there is an agent in an unknown environment (domain). This agent has some predefined actions and it can perceive its current state in the environment c...
Javad Safaei, Gholamreza Ghassem-Sani
125
Voted
GG
2004
Springer
15 years 6 months ago
Embedding in Switching Classes with Skew Gains
Abstract. In the context of graph transformation we look at the operation of switching, which can be viewed as an elegant method for realizing global transformations of (group-labe...
Andrzej Ehrenfeucht, Jurriaan Hage, Tero Harju, Gr...
86
Voted
FOCS
1993
IEEE
15 years 5 months ago
Dynamic Word Problems
Let M be a fixed finite monoid. We consider the problem of implementing a data type containing a vector x ϭ ( x1, x2, . . . , xn) ʦ Mn , initially (1, 1, . . . , 1), with two kin...
Gudmund Skovbjerg Frandsen, Peter Bro Miltersen, S...