Sciweavers

209 search results - page 17 / 42
» Exploiting Information Relationships for Access Control
Sort
View
CSFW
2004
IEEE
15 years 1 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
AGENTS
2000
Springer
15 years 1 months ago
The user interface as an agent environment
Theoretically motivated planning systems often make assumptions about their environments, in areas such as the predictability of action e ects, static behavior of the environment,...
Robert St. Amant, Luke S. Zettlemoyer
CORR
2010
Springer
57views Education» more  CORR 2010»
14 years 9 months ago
A Repeated Game Formulation of Energy-Efficient Decentralized Power Control
Decentralized multiple access channels where each transmitter wants to selfishly maximize his transmission energyefficiency are considered. Transmitters are assumed to choose freel...
Mael Le Treust, Samson Lasaulce
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ICRA
2007
IEEE
159views Robotics» more  ICRA 2007»
15 years 3 months ago
Decoupled Visual Servoing from a set of points imaged by an omnidirectional camera
Abstract— This paper presents a hybrid decoupled visionbased control scheme valid for the entire class of central catadioptric sensors (including conventional perspective cameras...
Hicham Hadj-Abdelkader, Youcef Mezouar, Philippe M...