Sciweavers

1907 search results - page 310 / 382
» Visualizing Action Semantics
Sort
View
111
Voted
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
15 years 28 days ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik
AVI
2008
15 years 8 days ago
Query-through-drilldown: data-oriented extensional queries
Traditional database query formulation is intensional: at the level of schemas, table and column names. Previous work has shown that filters can be created using a query paradigm ...
Alan J. Dix, Damon Oram
ESORICS
2010
Springer
15 years 8 days ago
A Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
Jay Ligatti, Srikar Reddy
AIPS
2010
14 years 11 months ago
A New Approach to Conformant Planning Using CNF*
In this paper, we develop a heuristic, progression based conformant planner, called CNF, which represents belief states by a special type of CNF formulae, called CNF-states. We de...
Son Thanh To, Tran Cao Son, Enrico Pontelli
AAMAS
2007
Springer
14 years 11 months ago
An algebra for commitment protocols
Protocols enable unambiguous, smooth interactions among agents. Commitments among agents are a powerful means of developing protocols. Commitments enable flexible execution of pro...
Ashok U. Mallya, Munindar P. Singh