Sciweavers

1998 search results - page 141 / 400
» Situated Control Rules
Sort
View
159
Voted
ICML
1996
IEEE
16 years 5 months ago
Representing and Learning Quality-Improving Search Control Knowledge
Generating good, production-quality plans is an essential element in transforming planners from research tools into real-world applications, but one that has been frequently overl...
M. Alicia Pérez
VLDB
2004
ACM
147views Database» more  VLDB 2004»
15 years 9 months ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 6 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
ENTCS
2007
113views more  ENTCS 2007»
15 years 4 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb
MASCOTS
2003
15 years 5 months ago
Bottleneck Estimation for Load Control Gateways
Providing Quality of Service (QoS) to inelastic data transmissions in a cost-efficient, highly scalable, and realistic fashion in IP networks remains a challenging research issue....
Krishna Pandit, Jens Schmitt, Martin Karsten, Ralf...