Sciweavers

92 search results - page 13 / 19
» Intuitions and the modelling of defeasible reasoning: some c...
Sort
View
SAC
2005
ACM
15 years 5 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
101
Voted
JOT
2008
108views more  JOT 2008»
14 years 11 months ago
Requirements analysis for large scale systems
All readers of this paper most likely have knowledge of the software requirements discipline and of the use case notation, however not everyone is aware that with the progress of ...
Roger Johnson, George Roussos, Luca Vetti Tagliati
IEEEPACT
2008
IEEE
15 years 6 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
91
Voted
ATAL
2009
Springer
15 years 6 months ago
A self-organizing neural network architecture for intentional planning agents
This paper presents a model of neural network embodiment of intentions and planning mechanisms for autonomous agents. The model bridges the dichotomy of symbolic and non-symbolic ...
Budhitama Subagdja, Ah-Hwee Tan
108
Voted
JWSR
2008
98views more  JWSR 2008»
14 years 11 months ago
Mining and Improving Composite Web Services Recovery Mechanisms
: Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services it is difficult to predict and reason abo...
Sami Bhiri, Walid Gaaloul, Claude Godart