Sciweavers

1816 search results - page 294 / 364
» Formal Concepts of Learning Systems Validation in Use
Sort
View
CCS
2006
ACM
15 years 3 months ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
IAT
2006
IEEE
15 years 5 months ago
A Multi-Agent Approach to Social Human Behaviour in Children's Play
This paper introduces a multi-agent system (MAS) approach for modelling social behaviours in children’s play. The children, the dynamics of their play, and the playground are mo...
Frodi Hammer, Alireza Derakhshan, Yves Demazeau, H...
IHIS
2005
ACM
15 years 5 months ago
Verifying web services composition based on hierarchical colored petri nets
Current Web services composition proposals, such as BPML, BPEL, WSCI, and OWL-S, provide notations for describing the control and data flows in Web service collaborations. However...
Yanping Yang, QingPing Tan, Yong Xiao
MOBILITY
2009
ACM
15 years 4 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
MMMACNS
2001
Springer
15 years 4 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato