Sciweavers

195 search results - page 26 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
75
Voted
ATAL
2005
Springer
15 years 3 months ago
Using emergence in participatory simulations to design multi-agent systems
In this paper, we present, through simulations of the coffee market of the state of Veracruz, how emergence of specialized roles in participatory simulations could be used to desi...
Paul Guyot, Alexis Drogoul, Christian Lemaît...
KES
2008
Springer
14 years 8 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
ISQED
2009
IEEE
117views Hardware» more  ISQED 2009»
15 years 4 months ago
Adaptive voltage controlled nanoelectronic addressing for yield, accuracy and resolution
An outstanding challenge for realizing nanoelectronic systems is nano-interface design, i.e., how to precisely access a nanoscale wire in an array for communication between a nano...
Bao Liu
IPPS
2009
IEEE
15 years 4 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
79
Voted
SEKE
2007
Springer
15 years 3 months ago
Real-Time Trust Management in Agent Based Online Auction Systems
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...
Rinkesh Patel, Haiping Xu, Ankit Goel