Filters








1,040,948 Hits in 2.8 sec

Undampened Oscillations in the Circuit: Combining the Components of 271(f) Doctrine Supplied by the Federal Circuit

Benjamin J. Byer
2007 Pittsburgh Journal of Technology Law and Policy  
This is done, however, at the great cost of complexity and awkwardness.  ...  This over breadth causes many tensions that require complex rules, such as the detailed doctrine necessary to properly determine component status of tangible products in relation to a process invention  ...  The potential infringer must know that such component is made and intended for the component to be combined outside the United States in a manner that would infringe the patent if the combination occurred  ... 
doi:10.5195/tlp.2007.30 fatcat:c4ygragvtbfvngdbitiiztxvva

Page 757 of The Journal of the Operational Research Society Vol. 52, Issue 7 [page]

2001 The Journal of the Operational Research Society  
The model included the JIT and component substitution options listed in Table 2. Two methods were used to calculate the profit of policy combinations in the analysis that follows.  ...  The batch sizes, profit, ROI and reorder policy for the most profitable policy combination at each investment level was calculated by full enumeration.  ... 

Anomaly discovery and resolution in web access control policies

Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
2011 Proceedings of the 16th ACM symposium on Access control models and technologies - SACMAT '11  
We introduce a policy-based segmentation technique to accurately identify policy anomalies and derive effective anomaly resolutions.  ...  Furthermore, designing and managing Web access control policies are often error-prone due to the lack of effective analysis mechanisms and tools.  ...  Acknowledgments This work was partially supported by the grants from National Science Foundation (NSF-IIS-0900970 and NSF-CNS-0831360) and Department of Energy (DE-SC0004308 and DE-FG02-03ER25565).  ... 
doi:10.1145/1998441.1998472 dblp:conf/sacmat/HuAK11 fatcat:qz3lssrr3veenpynw5ltpqe5xa

Detecting Incompleteness, Conflicting and Unreachability XACML Policies using Answer Set Programming [article]

Carroline Dewi Puspa Kencana Ramli
2015 arXiv   pre-print
In this paper we show a mechanism and a tool how to analyses big access control policies sets such as (i) incompleteness policies, (ii) conflicting policies, and (iii) unreachable policies.  ...  Recently, XACML is a popular access control policy language that is used widely in many applications. Policies in XACML are built based on many components over distributed resources.  ...  Access control policies in XACML are built based on many components and combined using a particular combining algorithm.  ... 
arXiv:1503.02732v1 fatcat:vxppgncjivevforavpnpcuke4a

The Logic of XACML [chapter]

Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, Flemming Nielson
2012 Lecture Notes in Computer Science  
Our main contribution is to derive a logic that precisely captures the idea behind the standard and to formally define the semantics of the policy combining algorithms of XACML.  ...  To guard against modelling artifacts we provide an alternative way of characterizing the policy combining algorithms and we formally prove the equivalence of these approaches.  ...  A PolicySet is composed of a sequence of others PolicySet or Policy components along with a policy combining algorithm ID and a Target.  ... 
doi:10.1007/978-3-642-35743-5_13 fatcat:xh5zfagsgjeu3alspuig575kyu

Discovery and Resolution of Anomalies in Web Access Control Policies

Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
2013 IEEE Transactions on Dependable and Secure Computing  
Furthermore, designing and managing Web access control policies are often error-prone due to the lack of effective analysis mechanisms and tools.  ...  We also discuss a proof-of-concept implementation of our method called XAnalyzer and demonstrate how our approach can efficiently discover and resolve policy anomalies.  ...  This work utilizes a model checker to formally verify properties of policies, and to compare access control policies with each other. Fisler et al.  ... 
doi:10.1109/tdsc.2013.18 fatcat:6fiicqdwwzdv3gd55zg5elpofi

Fifteen-component eighth-level algorithm of competition and industrial policies harmonization

E.E. Zainutdinova
2018 Journal of Fundamental and Applied Sciences  
The structural model of the fifteen-component eight-level concept of competition and industrial policies harmonization is presented, on the basis of which the algorithm of competition and industrial policies  ...  can only be used to assessment competition or exclusively industrial policy and «combined indicators» of competition and industrial policies, which are become by uniting the above-stated specific indicators  ...  The tenth component (the fifth level) is an integrated comparative assessment of competitiveness by synchronous and combined indicators, as a result of which determines combinations of possible situations  ... 
doi:10.4314/jfas.v9i2s.68 fatcat:plgbswxm6ffnndoxyilktulunm

Wheat Self-sufficiency in Different Policy Scenarios and Their Likely Impacts on Producers, Consumers, and the Public Exchequer

Abedullah ., Mubarik Ali
2001 Pakistan Development Review  
The triple combined policy option generates the highest net return to the society when each import and input subsidy component is combined with price support in the ratio of 40 and 20 percent, respectively  ...  The alternative policy options available are an uninterrupted market, imports, input subsidies, price support, combined policy developed by the combination of input subsidy and price support, and investment  ...  policy option is the 5th policy under scenario 2, when import and input subsidy component are combined in the ratio of 50 and 50.  ... 
doi:10.30541/v40i3pp.203-223 fatcat:aymt2w36onb7zncsd35kpsp2cm

A dynamic predictive maintenance policy for complex multi-component systems

Adriaan Van Horenbeek, Liliane Pintelon
2013 Reliability Engineering & System Safety  
The ability of the predictive maintenance policy to react to changing component deterioration and dependencies within a multi-component system is quantified and the results show significant cost savings  ...  The proposed maintenance policy is a dynamic method as the maintenance schedule is updated when new information on the degradation and remaining useful life of components becomes available.  ...  [8] , for a complex multi-component system considering different levels and combinations of dependencies between the components.  ... 
doi:10.1016/j.ress.2013.02.029 fatcat:efccx64ucjgzxb73xirdvtgvya

Design and Evaluation of XACML Conflict Policies Detection Mechanism

Kamalbir Singh, Sarbjeet Singh
2010 International Journal of Computer Science & Information Technology (IJCSIT)  
Conflict policies can have serious consequences and may lead to unauthorized access.  ...  This demonstrates that the approach is workable and can be used to detect conflict policies among a set of XACML policies.  ...  Table 1 . 1 XACML Components XACML Meaning Component Policy Set Describes the set of policies, other policy sets, policy combining algorithm, target and obligations.  ... 
doi:10.5121/ijcsit.2010.2505 fatcat:u7zruhxcxzeh7lylfykk34agla

Compatibility Checking of Heterogeneous Web Service Policies Using VDM++

Quan Z. Sheng, Jian Yu, Zakaria Maamar, Wei Jiang, Xitong Li
2009 2009 Congress on Services - I  
Web service policies capture the capabilities and requirements of Web services from both functional and nonfunctional perspectives.  ...  An executable formal model of policy languages is represented in VDM++ and different policies are then translated to this VDM++ model for compatibility checking.  ...  -The third step is to combine coincident Rule components within the combined Policy components. In order to combine Rule components, the combining procedure for Apply components are involved.  ... 
doi:10.1109/services-i.2009.87 dblp:conf/services/ShengYMJL09 fatcat:zt2k3ay53facvo7jdvyhh47snu

The Logic of XACML - Extended [article]

Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, Flemming Nielson
2011 arXiv   pre-print
Our main contribution is to derive a logic that precisely captures the idea behind the standard and to formally define the semantics of the policy combining algorithms of XACML.  ...  To guard against modelling artefacts we provide an alternative way of characterizing the policy combining algorithms and we formally prove the equivalence of these approaches.  ...  A PolicySet is composed of a sequence of other PolicySet or Policy components along with a policy combining algorithm ID and a Target.  ... 
arXiv:1110.3706v1 fatcat:j6bdmvu245d3npxvxfrl3extxu

Linear Bellman combination for control of character animation

Marco da Silva, Frédo Durand, Jovan Popović
2009 ACM Transactions on Graphics  
It naturally weights the contribution of each component controller by its relevance to the current state and goal of the system.  ...  Furthermore, this combination is provably optimal for a new task if the component controllers are also optimal for related tasks.  ...  Autodesk and Adobe systems.  ... 
doi:10.1145/1531326.1531388 fatcat:tc7gq55kanaoxfykujegy4inhy

Linear Bellman combination for control of character animation

Marco da Silva, Frédo Durand, Jovan Popović
2009 ACM SIGGRAPH 2009 papers on - SIGGRAPH '09  
It naturally weights the contribution of each component controller by its relevance to the current state and goal of the system.  ...  Furthermore, this combination is provably optimal for a new task if the component controllers are also optimal for related tasks.  ...  Autodesk and Adobe systems.  ... 
doi:10.1145/1576246.1531388 fatcat:qvgk6jjdgjb45fk4jjspvnqwg4

Explicit Architectural Policies to Satisfy NFRs Using COTS [chapter]

Claudia López, Hernán Astudillo
2006 Lecture Notes in Computer Science  
Azimut framework realizes these ideas, supports larger-scale work through catalogs of policies and components, and allows traceability and reuse of architecture by enabling enabling these architecture-level  ...  The key ideas are representation of NFRs through architectural concerns using architectural policies, systematic reification of policies into mechanisms, and multi-dimensional description of components  ...  The ARM indicates which combinations satisfy each policy, and may have rules about mechanism combinations (e.g. potential restrictions).  ... 
doi:10.1007/11663430_24 fatcat:trbzxswbzvhdtpblgkobnvca34
« Previous Showing results 1 — 15 out of 1,040,948 results