Sciweavers

4555 search results - page 463 / 911
» Deductive Algorithmic Knowledge
Sort
View
ACISP
2008
Springer
15 years 11 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
AINA
2007
IEEE
15 years 11 months ago
Context-Aware Elevator Scheduling
Abstract— Research on context-aware systems is usually usercentric and thus focussed on the context of a specific user to serve his or her needs in an optimized way. In this pap...
Thomas Strang, Christian Bauer
ICRA
2007
IEEE
164views Robotics» more  ICRA 2007»
15 years 11 months ago
Real Time Biologically-Inspired Depth Maps from Spherical Flow
— We present a strategy for generating real-time relative depth maps of an environment from optical flow, under general motion. We achieve this using an insect-inspired hemisphe...
Chris McCarthy, Nick Barnes, Mandyam Srinivasan
INFOCOM
2007
IEEE
15 years 11 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
ATAL
2007
Springer
15 years 11 months ago
Dynamic task allocation within an open service-oriented MAS architecture
A MAS architecture consisting of service centers is proposed. Within each service center, a mediator coordinates service delivery by allocating individual tasks to corresponding t...
Ivan Jureta, Stéphane Faulkner, Youssef Ach...