Sciweavers

3038 search results - page 187 / 608
» Controlling Engineering Problem Solving
Sort
View
CCS
2007
ACM
15 years 8 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
GECCO
2007
Springer
180views Optimization» more  GECCO 2007»
15 years 8 months ago
Towards the coevolution of cellular automata controllers for chemical computing with the B-Z reaction
We propose that the behaviour of non-linear media can be controlled automatically through coevolutionary systems. By extension, forms of unconventional computing, i.e., massively ...
Christopher Stone, Rita Toth, Andrew Adamatzky, Be...
SACMAT
2005
ACM
15 years 7 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
ATAL
2005
Springer
15 years 7 months ago
Controlling teams of uninhabited air vehicles
We describe a Multi-Agent System (MAS) for controlling teams of uninhabited air vehicles (UAVs) in the context of a larger system that has been used to evaluate potential concepts...
Jeremy W. Baxter, Graham S. Horn
ICCBR
2005
Springer
15 years 7 months ago
Autonomous Internal Control System for Small to Medium Firms
Small to medium enterprises require an internal control mechanism in order to monitor their modus operandi and to analyse whether they are achieving their goals. A tool for the dec...
María Lourdes Borrajo Diz, Juan M. Corchado...