A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Undampened Oscillations in the Circuit: Combining the Components of 271(f) Doctrine Supplied by the Federal Circuit
2007
Pittsburgh Journal of Technology Law and Policy
This is done, however, at the great cost of complexity and awkwardness. ...
This over breadth causes many tensions that require complex rules, such as the detailed doctrine necessary to properly determine component status of tangible products in relation to a process invention ...
The potential infringer must know that such component is made and intended for the component to be combined outside the United States in a manner that would infringe the patent if the combination occurred ...
doi:10.5195/tlp.2007.30
fatcat:c4ygragvtbfvngdbitiiztxvva
Page 757 of The Journal of the Operational Research Society Vol. 52, Issue 7
[page]
2001
The Journal of the Operational Research Society
The model included the JIT and component substitution options listed in Table 2. Two methods were used to calculate the profit of policy combinations in the analysis that follows. ...
The batch sizes, profit, ROI and reorder policy for the most profitable policy combination at each investment level was calculated by full enumeration. ...
Anomaly discovery and resolution in web access control policies
2011
Proceedings of the 16th ACM symposium on Access control models and technologies - SACMAT '11
We introduce a policy-based segmentation technique to accurately identify policy anomalies and derive effective anomaly resolutions. ...
Furthermore, designing and managing Web access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. ...
Acknowledgments This work was partially supported by the grants from National Science Foundation (NSF-IIS-0900970 and NSF-CNS-0831360) and Department of Energy (DE-SC0004308 and DE-FG02-03ER25565). ...
doi:10.1145/1998441.1998472
dblp:conf/sacmat/HuAK11
fatcat:qz3lssrr3veenpynw5ltpqe5xa
Detecting Incompleteness, Conflicting and Unreachability XACML Policies using Answer Set Programming
[article]
2015
arXiv
pre-print
In this paper we show a mechanism and a tool how to analyses big access control policies sets such as (i) incompleteness policies, (ii) conflicting policies, and (iii) unreachable policies. ...
Recently, XACML is a popular access control policy language that is used widely in many applications. Policies in XACML are built based on many components over distributed resources. ...
Access control policies in XACML are built based on many components and combined using a particular combining algorithm. ...
arXiv:1503.02732v1
fatcat:vxppgncjivevforavpnpcuke4a
The Logic of XACML
[chapter]
2012
Lecture Notes in Computer Science
Our main contribution is to derive a logic that precisely captures the idea behind the standard and to formally define the semantics of the policy combining algorithms of XACML. ...
To guard against modelling artifacts we provide an alternative way of characterizing the policy combining algorithms and we formally prove the equivalence of these approaches. ...
A PolicySet is composed of a sequence of others PolicySet or Policy components along with a policy combining algorithm ID and a Target. ...
doi:10.1007/978-3-642-35743-5_13
fatcat:xh5zfagsgjeu3alspuig575kyu
Discovery and Resolution of Anomalies in Web Access Control Policies
2013
IEEE Transactions on Dependable and Secure Computing
Furthermore, designing and managing Web access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. ...
We also discuss a proof-of-concept implementation of our method called XAnalyzer and demonstrate how our approach can efficiently discover and resolve policy anomalies. ...
This work utilizes a model checker to formally verify properties of policies, and to compare access control policies with each other. Fisler et al. ...
doi:10.1109/tdsc.2013.18
fatcat:6fiicqdwwzdv3gd55zg5elpofi
Fifteen-component eighth-level algorithm of competition and industrial policies harmonization
2018
Journal of Fundamental and Applied Sciences
The structural model of the fifteen-component eight-level concept of competition and industrial policies harmonization is presented, on the basis of which the algorithm of competition and industrial policies ...
can only be used to assessment competition or exclusively industrial policy and «combined indicators» of competition and industrial policies, which are become by uniting the above-stated specific indicators ...
The tenth component (the fifth level) is an integrated comparative assessment of competitiveness by synchronous and combined indicators, as a result of which determines combinations of possible situations ...
doi:10.4314/jfas.v9i2s.68
fatcat:plgbswxm6ffnndoxyilktulunm
Wheat Self-sufficiency in Different Policy Scenarios and Their Likely Impacts on Producers, Consumers, and the Public Exchequer
2001
Pakistan Development Review
The triple combined policy option generates the highest net return to the society when each import and input subsidy component is combined with price support in the ratio of 40 and 20 percent, respectively ...
The alternative policy options available are an uninterrupted market, imports, input subsidies, price support, combined policy developed by the combination of input subsidy and price support, and investment ...
policy option is the 5th policy under scenario 2, when import and input subsidy component are combined in the ratio of 50 and 50. ...
doi:10.30541/v40i3pp.203-223
fatcat:aymt2w36onb7zncsd35kpsp2cm
A dynamic predictive maintenance policy for complex multi-component systems
2013
Reliability Engineering & System Safety
The ability of the predictive maintenance policy to react to changing component deterioration and dependencies within a multi-component system is quantified and the results show significant cost savings ...
The proposed maintenance policy is a dynamic method as the maintenance schedule is updated when new information on the degradation and remaining useful life of components becomes available. ...
[8] , for a complex multi-component system considering different levels and combinations of dependencies between the components. ...
doi:10.1016/j.ress.2013.02.029
fatcat:efccx64ucjgzxb73xirdvtgvya
Design and Evaluation of XACML Conflict Policies Detection Mechanism
2010
International Journal of Computer Science & Information Technology (IJCSIT)
Conflict policies can have serious consequences and may lead to unauthorized access. ...
This demonstrates that the approach is workable and can be used to detect conflict policies among a set of XACML policies. ...
Table 1 . 1 XACML Components XACML Meaning Component Policy Set Describes the set of policies, other policy sets, policy combining algorithm, target and obligations. ...
doi:10.5121/ijcsit.2010.2505
fatcat:u7zruhxcxzeh7lylfykk34agla
Compatibility Checking of Heterogeneous Web Service Policies Using VDM++
2009
2009 Congress on Services - I
Web service policies capture the capabilities and requirements of Web services from both functional and nonfunctional perspectives. ...
An executable formal model of policy languages is represented in VDM++ and different policies are then translated to this VDM++ model for compatibility checking. ...
-The third step is to combine coincident Rule components within the combined Policy components. In order to combine Rule components, the combining procedure for Apply components are involved. ...
doi:10.1109/services-i.2009.87
dblp:conf/services/ShengYMJL09
fatcat:zt2k3ay53facvo7jdvyhh47snu
The Logic of XACML - Extended
[article]
2011
arXiv
pre-print
Our main contribution is to derive a logic that precisely captures the idea behind the standard and to formally define the semantics of the policy combining algorithms of XACML. ...
To guard against modelling artefacts we provide an alternative way of characterizing the policy combining algorithms and we formally prove the equivalence of these approaches. ...
A PolicySet is composed of a sequence of other PolicySet or Policy components along with a policy combining algorithm ID and a Target. ...
arXiv:1110.3706v1
fatcat:j6bdmvu245d3npxvxfrl3extxu
Linear Bellman combination for control of character animation
2009
ACM Transactions on Graphics
It naturally weights the contribution of each component controller by its relevance to the current state and goal of the system. ...
Furthermore, this combination is provably optimal for a new task if the component controllers are also optimal for related tasks. ...
Autodesk and Adobe systems. ...
doi:10.1145/1531326.1531388
fatcat:tc7gq55kanaoxfykujegy4inhy
Linear Bellman combination for control of character animation
2009
ACM SIGGRAPH 2009 papers on - SIGGRAPH '09
It naturally weights the contribution of each component controller by its relevance to the current state and goal of the system. ...
Furthermore, this combination is provably optimal for a new task if the component controllers are also optimal for related tasks. ...
Autodesk and Adobe systems. ...
doi:10.1145/1576246.1531388
fatcat:qvgk6jjdgjb45fk4jjspvnqwg4
Explicit Architectural Policies to Satisfy NFRs Using COTS
[chapter]
2006
Lecture Notes in Computer Science
Azimut framework realizes these ideas, supports larger-scale work through catalogs of policies and components, and allows traceability and reuse of architecture by enabling enabling these architecture-level ...
The key ideas are representation of NFRs through architectural concerns using architectural policies, systematic reification of policies into mechanisms, and multi-dimensional description of components ...
The ARM indicates which combinations satisfy each policy, and may have rules about mechanism combinations (e.g. potential restrictions). ...
doi:10.1007/11663430_24
fatcat:trbzxswbzvhdtpblgkobnvca34
« Previous
Showing results 1 — 15 out of 1,040,948 results