Sciweavers

1366 search results - page 210 / 274
» Modularizing Contexted Constraints
Sort
View
TRUSTBUS
2009
Springer
15 years 9 months ago
The OPL Access Control Policy Language
Abstract. Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of dut...
Christopher Alm, Ruben Wolf, Joachim Posegga
AGILE
2009
Springer
295views GIS» more  AGILE 2009»
15 years 9 months ago
Enhancing 3D City Models with Heterogeneous Spatial Information: Towards 3D Land Information Systems
Spatial and georeferenced information plays an important role in urban land management processes such as spatial planning and environmental management. As many of the processes ar...
Lutz Ross, Jannes Bolling, Jürgen Döllne...
ISMIS
2009
Springer
15 years 9 months ago
Discovering Relevant Cross-Graph Cliques in Dynamic Networks
Abstract. Several algorithms, namely CubeMiner, Trias, and DataPeeler, have been recently proposed to mine closed patterns in ternary relations. We consider here the specific cont...
Loïc Cerf, Tran Bao Nhan Nguyen, Jean-Fran&cc...
AFRICACRYPT
2010
Springer
15 years 9 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
CEC
2008
IEEE
15 years 9 months ago
A study on constrained MA using GA and SQP: Analytical vs. finite-difference gradients
— Many deterministic algorithms in the context of constrained optimization require the first-order derivatives, or the gradient vectors, of the objective and constraint function...
Stephanus Daniel Handoko, Chee Keong Kwoh, Yew-Soo...