Sciweavers

177 search results - page 21 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
CORR
2006
Springer
113views Education» more  CORR 2006»
15 years 1 months ago
A Unified View of TD Algorithms; Introducing Full-Gradient TD and Equi-Gradient Descent TD
This paper addresses the issue of policy evaluation in Markov Decision Processes, using linear function approximation. It provides a unified view of algorithms such as TD(), LSTD()...
Manuel Loth, Philippe Preux
ICSOC
2007
Springer
15 years 8 months ago
Service Selection Based on Non-functional Properties
Service-oriented Architecture supports software to be composed from services dynamically. Selecting and composing appropriate services according to business process, policies and n...
Stephan Reiff-Marganiec, HongQing Yu, Marcel Tilly
110
Voted
ACSAC
1999
IEEE
15 years 6 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
ESWA
2011
220views Database» more  ESWA 2011»
14 years 5 months ago
Unsupervised neural models for country and political risk analysis
This interdisciplinary research project focuses on relevant applications of Knowledge Discovery and Artificial Neural Networks in order to identify and analyse levels of country, b...
Álvaro Herrero, Emilio Corchado, Alfredo Ji...
126
Voted
ICDCIT
2004
Springer
15 years 7 months ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller