Sciweavers

650 search results - page 41 / 130
» Privacy in Non-private Environments
Sort
View
AGENTS
2000
Springer
15 years 2 months ago
Design-to-Criteria Scheduling: Real-Time Agent Control
Design-to-Criteria builds custom schedules for agents that meet hard temporal constraints, hard resource constraints, and soft constraints stemming from soft task interactions or ...
Thomas Wagner, Victor R. Lesser
ACSAC
1999
IEEE
15 years 2 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
ACSAC
1999
IEEE
15 years 2 months ago
Napoleon: A Recipe for Workflow
This paper argues that Napoleon, a flexible, role-based access control (RBAC) modeling environment, is also a practical solution for enforcing business process control, or workflo...
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard...
AGENTS
1998
Springer
15 years 2 months ago
Integrating Active Perception with an Autonomous Robot Architecture
Today's robotics applications require complex, real-time, high-bandwidth sensor systems. Although many such systems have been developed [12][14][17][10], integrating them int...
Glenn S. Wasson, David Kortenkamp, Eric Huber
SP
2000
IEEE
15 years 1 months ago
A More Efficient Use of Delta-CRLs
Delta-certificate revocation lists (delta-CRLs) were designed to provide a more efficient way to distribute certificate status information. However, as this paper shows, in some e...
David A. Cooper