Sciweavers

3771 search results - page 504 / 755
» Subobject Transformation Systems
Sort
View
JIKM
2008
90views more  JIKM 2008»
15 years 4 months ago
Personal Knowledge Management: a Study of Knowledge Behaviour of Academicians
Abstract. Current theories of knowledge management postulate a cycle of knowledge creation, refinement and implementation that hinges on the transformation of tacit, or practical, ...
Monika Mittal
JSW
2008
105views more  JSW 2008»
15 years 4 months ago
Reasoning Principles for Negotiating Agent
Automated negotiation is an important applying field of agent theory and technology. For the current agent theoretical models have some troubles in explaining the agent's nego...
Mukun Cao, Yuqiang Feng
KBS
2008
110views more  KBS 2008»
15 years 4 months ago
Intensity-based image registration using multiple distributed agents
Image registration is the process of geometrically aligning images taken from different sensors, viewpoints or instances in time. It plays a key role in the detection of defects o...
Roger J. Tait, Gerald Schaefer, Adrian A. Hopgood
139
Voted
JHSN
2006
100views more  JHSN 2006»
15 years 4 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
KES
2008
Springer
15 years 4 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini