Sciweavers

1998 search results - page 169 / 400
» Situated Control Rules
Sort
View
IJIS
2007
94views more  IJIS 2007»
15 years 4 months ago
The eightfold way of deliberation dialogue
Deliberation dialogues occur when two or more participants seek to jointly agree an action or a course of action in some situation. We present the first formal framework for such...
Peter McBurney, David Hitchcock, Simon Parsons
COMPSEC
2004
156views more  COMPSEC 2004»
15 years 4 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
COMPUTER
2002
115views more  COMPUTER 2002»
15 years 4 months ago
PKI: It's Not Dead, Just Resting
Despite enthusiastic predictions in the trade press, an X.509-style PKI has so far failed to eventuate to any significant degree. This paper looks at some of the reasons behind th...
Peter Gutmann
CORR
2002
Springer
123views Education» more  CORR 2002»
15 years 4 months ago
Ideal decompositions and computation of tensor normal forms
Abstract. Symmetry properties of r-times covariant tensors T can be described by certain linear subspaces W of the group ring K[Sr] of a symmetric group Sr. If for a class of tenso...
Bernd Fiedler
VLDB
2002
ACM
97views Database» more  VLDB 2002»
15 years 4 months ago
Incorporating XSL Processing into Database Engines
The two observations that 1) many XML documents are stored in a database or generated from data stored in a database and 2) processing these documents with XSL stylesheet processo...
Guido Moerkotte