Sciweavers

121 search results - page 22 / 25
» Towards Access Control for Visual Web Model Management
Sort
View
138
Voted
ATAL
2006
Springer
15 years 5 months ago
Autonomous agents for air-traffic deconfliction
This contribution presents a deployment exercise of multiagent technology in the domain of deconflicted air-traffic control among several autonomous aerial vehicles (manned as wel...
Michal Pechoucek, David Sislák, Dusan Pavl&...
165
Voted
BTW
2007
Springer
245views Database» more  BTW 2007»
15 years 9 months ago
From Personal Desktops to Personal Dataspaces: A Report on Building the iMeMex Personal Dataspace Management System
Abstract: We propose a new system that is able to handle the entire Personal Dataspace of a user. A Personal Dataspace includes all data pertaining to a user on all his disks and o...
Jens-Peter Dittrich, Lukas Blunschi, Markus Fä...
114
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
122
Voted
DBSEC
2003
155views Database» more  DBSEC 2003»
15 years 5 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
132
Voted
EUROSYS
2010
ACM
15 years 8 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero