Sciweavers

3979 search results - page 155 / 796
» Wild control operators
Sort
View
95
Voted
INFOSCALE
2007
ACM
14 years 11 months ago
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
Hong Zhu, Renchao Jin, Kevin Lü
ICWS
2007
IEEE
14 years 11 months ago
A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture
Service matchmaking is an important process in the operation of Service-Oriented Architecture (SOA) based systems. In this process, information from both service providers and req...
Stephen S. Yau, Junwei Liu
AIPS
2004
14 years 11 months ago
Distributed Feedback Control for Decision Making on Supply Chains
Decision makers on supply chains face an uncertain, dynamic, and strategic multiagent environment. We report on Deep Maize, an agent we designed to participate in the 2003 Trading...
Christopher Kiekintveld, Michael P. Wellman, Satin...
WSC
1998
14 years 11 months ago
Modeling a Controlled Conveyor Network with Merging Configuration
Simulation with Arena is used to analyze a controlled conveyor network with merging configuration (CNMC). We use simulation to realize the logic in a queueingtheoretic model (QTM)...
Gary Gang Jing, W. David Kelton, José C. Ar...
IJCAI
1997
14 years 11 months ago
Combining Knowledge Acquisition and Machine Learning to Control Dynamic Systems
This paper presents an interactive method for building a controller for dynamic systems by using a combination of knowledge acquisition and machine learning techniques. The aim is...
G. M. Shiraz, Claude Sammut