Sciweavers

1167 search results - page 75 / 234
» policy 2007
Sort
View
DGO
2009
118views Education» more  DGO 2009»
15 years 29 days ago
Towards collaborative web-based impact assessment
Impact assessment (IA) is a key method for the legislator to evaluate policies, norms or regulations currently under development. Experts use IA to gather and analyze input from m...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
IJCAI
1989
15 years 1 months ago
A Planning/Scheduling Methodology for the Constrained Resource Problem
This paper presents a new planning/scheduling methodology for the constrained resource problem (CRP), in which the amount of available resources is limited and usually monotonical...
Naiping Keng, David Y. Y. Yun
ESANN
2007
15 years 1 months ago
The Recurrent Control Neural Network
This paper presents our Recurrent Control Neural Network (RCNN), which is a model-based approach for a data-efficient modelling and control of reinforcement learning problems in di...
Anton Maximilian Schäfer, Steffen Udluft, Han...
DBSEC
2006
122views Database» more  DBSEC 2006»
15 years 1 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
JSW
2007
106views more  JSW 2007»
14 years 11 months ago
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies
Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...