Search
Now showing items 21-30 of 127
Semantic access control for corporate mobile devices
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or ...
Control network programming with SPIDER: Dynamic search control
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the means for dynamic control of the computation process that are available in Spider - a language for Control Network Programming. © 2010 Springer-Verlag.
Non-procedural implementation of local heuristic search in control network programming
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for ...
How the education affects female labor force? Empirical evidence from Turkey
(Procedia - Social and Behavioral Sciences, 2010)
This article investigates the major issues of females in Turkey and the characteristics required of school improvement with many educational reforms they have faced from the perspectives of women. It is a brief overview ...
Viterbi-like joint optimization of stereo extraction for on-line rate adaptation in scalable multiview video coding
(Proceedings - International Conference on Image Processing, ICIP, 2010)
The concept of Quality Layers (QL) has been adopted in the SVC standard in order to ensure optimal rate adaptation of pre-coded video in the rate-distortion sense [1]. We have previously extended QL to multiview scalable ...
The effects of organizational training on organizational commitment
(International Journal of Training and Development, 2010)
This empirical study investigated the impact of organizational training on employee commitment focusing on employees' emotional and affective responses towards their organization. Organizational training is conceptualized ...
Effective use of cloud computing in educational institutions
(Procedia - Social and Behavioral Sciences, 2010)
Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. It will likely have a significant impact ...
Modeling efficient multi-chained stream signature protocol using communicating sequential processeses
(SSIRI-C 2010 - 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion, 2010)
Communicating Sequential Processes (CSP) is a process algebra, designed for modeling and analyzing the behavior of concurrent systems. Several security protocols are modeled with CSP and verified using model-checking or ...
Symmetric f bi-derivations of lattices
(Ars Combinatoria, 2010)
In this paper, we introduced the notion of symmetric f bi-derivations on lattices and investigated some related properties. We characterized the distributive lattice by symmetric f blderivations.
Utilization of timed automata as a verification tool for security protocols
(SSIRI-C 2010 - 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion, 2010)
Timed Automata is an extension to the automata-theoretic approach for the modeling of real time systems that introduces time into the classical automata. It has become an important research area in both the context of ...