the proceedings contain 37 papers. the special focus in this conference is on Coordination and Planning. the topics include: Reducing risk in norm-based systems;from public plans to global solutions in multiagent plan...
ISBN:
(纸本)9783319335087
the proceedings contain 37 papers. the special focus in this conference is on Coordination and Planning. the topics include: Reducing risk in norm-based systems;from public plans to global solutions in multiagent planning;intelligent people flow coordination in smart spaces;customized document research by a stigmergic approach using agents and artifacts;collaborative framework for monitoring reliability of distributed components of composed services;graph patterns, reinforcement learning and models of reputation for improving coalition formation in collaborative multi-agent systems;multiagent model for agile context inference based on articial immune systems and sparse distributed representations;factored MDPs for optimal prosumer decision-making in continuous state spaces;composing swarm robot formations based on their distributions using mobile agents;group-based pricing to shape demand in real-time electricity markets;human rating methods on multi-agent systems;learning in multi agent social environments with opponent models;a particle swarm optimization metaheuristic for the blocking flow shop scheduling problem;towards an agent-based negotiation scheme for scheduling electric vehicles charging;agreement technologies applied to transmission towers maintenance;a fuzzy logic adaptive reasoning agent for energy trading;a dialectical approach to enable decision making in online trading;argumentation-based hybrid recommender system for recommending learning objects;identifying malicious behavior in multi-party bipolar argumentation debates;probabilistic argumentation, a small step for uncertainty, a giant step for complexity;modeling social deviance in artificial agent societies and modeling and enforcing semantic obligations for accesscontrol.
this work presents an investigation on TFTs which have been fabricated with very similar process flows withthe exception of the placement of the gate electrode. Bottom-gate TFTs with back-channel passivation that dem...
详细信息
ISBN:
(纸本)9781607687276
this work presents an investigation on TFTs which have been fabricated with very similar process flows withthe exception of the placement of the gate electrode. Bottom-gate TFTs with back-channel passivation that demonstrate good performance and resistance to aging have been realized, however bias-stress stability continues to remain a challenge. Top-gate TFTs have demonstrated improvement in the uniformity of device operation as well as bias-stress stability, and have the potential to offer an advantage in off-state performance. Double-gate TFTs take further advantage of improved electrostatics, but present additional challenges in process integration. Device operation and response to applied bias-stress of all three gate electrode configurations will be compared, with reference to TCAD simulations that utilize common bulk and interface defect models. Electrical measurements and TCAD simulations are also used to develop a hypothesis on the origin of non-ideal behavior observed on scaled devices, which can be addressed by appropriate gate electrode option.
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based accesscontrol;an accesscontrol concept for novel automotive HMI systems;monitor placem...
ISBN:
(纸本)9781450329392
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based accesscontrol;an accesscontrol concept for novel automotive HMI systems;monitor placement for large-scale systems;anomaly detection and visualization in generative RBAC models;reduction of accesscontrol decisions;towards more usable information flow policies for contemporary operating systems;attribute based accesscontrol for APIs in spring security;comprehensive integrity protection for desktop Linux;game theoretic analysis of multiparty accesscontrol in online social networks;scalable and precise automated analysis of administrative temporal role-based accesscontrol;accesscontrolmodels for geo-social computing systems;limiting access to unintentionally leaked sensitive documents using malware signatures;and user-centric identity as a service-architecture for eIDs with selective attribute disclosure.
We address the generation and analysis of hard instances for verification problems in accesscontrolthat are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particu...
详细信息
ISBN:
(纸本)9781450335560
We address the generation and analysis of hard instances for verification problems in accesscontrolthat are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particular problem, the user-authorization query problem (UAQ) in Role-Based accesscontrol (RBAC). We show how to systematically generate hard instances for it. We then analyze what we call the structure of those hard instances. Our work brings the important aspect of systematic investigation of hard input classes to accesscontrol research.
the proceedings contain 13 papers. the topics discussed include: methodology to events identification in vehicles using statistical process control on steering wheel data;asymmetry analysis of inbound/outbound car tra...
ISBN:
(纸本)9781450337588
the proceedings contain 13 papers. the topics discussed include: methodology to events identification in vehicles using statistical process control on steering wheel data;asymmetry analysis of inbound/outbound car traffic load distribution in Luxembourg;SLA: speed and location aware LTE scheduler for vehicular safety applications;intention sharing for medium accesscontrol in wireless LANs;studying the effect of human mobility on MANET topology and routing: friend or foe?;design and implementation of a software-defined integrated wired-wireless network testbed;smart mm-wave beam steering algorithm for fast link re-establishment under node mobility in 60 GHz indoor WLANs;a scheduling algorithm of cell zooming for energy efficiency in disasters;and VARSA: an efficient variable radius sensor activation scheme for target tracking using wireless sensor networks.
Driving a vehicle has become a challenging task, especially because up to 90% of accidents involving vehicles are caused by drivers' errors. In this paper, we propose a method for events identification withthe us...
详细信息
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary de...
详细信息
ISBN:
(纸本)9781450335560
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary decisions to utilize users' blacklists in accesscontrol policies, resulting into eight access restrictions. We formally define these restrictions in a hybrid logic for relationship-based accesscontrol, and provide syntactical transformations to rewrite a hybrid logic accesscontrol formula when fixing an access restriction. this enables a flexible and user-friendly approach for restricting access in social networks. We develop efficient algorithms for enforcing a subset of accesscontrol policies with restrictions. the effectiveness of the access restrictions and the efficiency of our algorithms are evaluated on a Facebook dataset.
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes accesscontrol decisions. Existing cloud...
详细信息
In this paper we present a new class of MAC protocols for wireless LANs based on sharing of transmission intentions. We develop an example protocol implementation based on distributed, co-operative scheduling of data ...
详细信息
暂无评论