265,597 Hits in 5.0 sec

Correcting Access Restrictions to a Consequence More Flexibly

Eldora, Martin Knechtel, Rafael Peñaloza
2011 International Workshop on Description Logics  
In previous work we have shown how to correct the access restrictions if the security administrator knows the precise access level that a consequence must receive, and axioms are relabeled to that same  ...  We also allow a more flexible labeling function, where the new access level of the relabeled axioms may differ from the level of the restriction.  ...  Conclusions We have presented algorithms for correcting the boundary of a consequence in a more flexible manner than previous approaches.  ... 
dblp:conf/dlog/EldoraKP11 fatcat:oegtxhfwq5epfifhw6pzjvgc4e

Consequences of rigid and flexible learning

Linda Baker, John L. Santa, John M. Gentry
1977 Bulletin of the Psychonomic Society  
Subjects are often restricted at retrieval such that they can only access material via cues encoded at study.  ...  Three experiments examined the consequences of learning material in rigid and flexible contexts. In Experiment 1, subjects studied and recalled a list of words in serial order.  ...  Subjects are often restricted at retrieval such that they can only access material via cues encoded at study.  ... 
doi:10.3758/bf03336929 fatcat:kfspkj3plncvra2xh7zjtv4d5m


Grzegorz Michalski
2012 Figshare  
If the risk exposition should be higher, then smarter is to choose more flexible and more conservative solutions to have better results. It works in opposite direction also.  ...  Of course, restrictive strategy is perceived as more risky and therefore depending on investors risk aversion level, they tend to ascribe to the financed nonprofit organization applying restrictive strategy  ... 
doi:10.6084/m9.figshare.89802 fatcat:p5riavq7grbafanill32xsu4zq

Toward real microkernels

Jochen Liedtke
1996 Communications of the ACM  
More Flexibility Performance-related constraints seem to be disappearing.  ...  The important restriction is that instead of physical page frames, the granter can grant only those pages already accessible to itself.  ...  To copy otherwise, to republish, to post on servers, or to redistribute to lists requires prior specific permission and/or a fee.  ... 
doi:10.1145/234215.234473 fatcat:wmipp5n2ebhnpo7al2xbxw2iri

Page 37 of Today's Internist Vol. 34, Issue 5 [page]

1993 Today's Internist  
care or restricting access to medi- cal services.  ...  If done correctly, health care reform will create a more efficient system that expands access to care without sacrific- ing quality.  ... 

Abstraction for AoS and SoA Layout in C++ [chapter]

Robert Strzodka
2012 GPU Computing Gems Jade Edition  
Acknowledgements A big thank you goes to Cliff Woolley from NVIDIA for helping with the organization of the paper.  ...  This restriction could be removed by making the grouping size a template parameter of every flexible structure definition.  ...  As the data access syntax remains the same, the main additional work required from the programmer is a more flexible structure definition based on the ASA (array of structs of arrays) coding pattern.  ... 
doi:10.1016/b978-0-12-385963-1.00031-9 fatcat:5hptgwgmrbdrplw3l3idprrjxa

Safety and security of programmable network infrastructures

S. Alexander, W.A. Arbaugh, A.D. Keromytis, J.M. Smith
1998 IEEE Communications Magazine  
We illustrate these ideas with the Secure Active Network Environment (SANE) architecture, which provides a means of controlling access to the functions provided by any programmable infrastructure. directly  ...  With the extended service model of a programmable infrastructure, these questions become much more complex than in simple time-division multiplexing of a link.  ...  Unauthenticated access to the control plane can have severe consequences to the security of the whole network.  ... 
doi:10.1109/35.722141 fatcat:fbrzzvixtbdq5dfchvdec6w5ni

Spatial Flexibility in Job Mobility: Macrolevel Opportunities and Microlevel Restrictions

Maarten van Ham, Clara H Mulder, Pieter Hooimeijer
2001 Environment and planning A  
2001) Spatial flexibility in job mobility: macro-level opportunities and micro-level restrictions. Environment and Planning A 33, 921-940. http://dx.Abstract.  ...  The first is a low overall chance of general job mobility; the second is a limited search area leading to low workplace mobility.  ...  Clara Mulder's research was made possible by a fellowship from the Royal Netherlands Academy of Arts and Sciences. Notes 1.  ... 
doi:10.1068/a33164 fatcat:digl2fxxxzhpbaxgzslzvgocvu

Page 11 of Essays in International Economics Vol. , Issue 53 [page]

1966 Essays in International Economics  
take firm corrective action more promptly.  ...  These benefits include the possi- bility of holding earning assets in reserves, which is important to the independence of many central banks, and that of having access in case of need to a large and flexible  ... 

The Use of Mobile Technologies to Overcome Digital Inequities in Prison Education: a Pilot Project

Helen Farley, Angela Murphy
2012 International Conference on Mobile and Contextual Learning  
Lack of internet access is especially problematic for those studying in a sector that is increasingly characterised by online and flexible course offerings.  ...  In this paper, we report on a project that will attempt to address the digital challenges that hinder prisoner access to higher education and provide inclusive learning experiences for incarcerated students  ...  These options for flexible and mobile delivery are not available to the student studying within a correctional centre.  ... 
dblp:conf/mlearn/FarleyM12 fatcat:th2eltxunfa37l3ji3cyhlty7q

Flexibility in Process-Aware Information Systems [chapter]

Manfred Reichert, Stefanie Rinderle-Ma, Peter Dadam
2009 Lecture Notes in Computer Science  
Needed business agility is often hindered by the lacking flexibility of existing PAIS. Once a process is implemented, its logic cannot be adapted or refined anymore.  ...  We also survey existing approaches fostering flexible process support.  ...  Mandatory and restricted data objects are explicitly linked to one or more activities. If a data object is mandatory, a value will have to be assigned to it before the activity can be completed.  ... 
doi:10.1007/978-3-642-00899-3_7 fatcat:mxsnewebmvhrvchxku7tkdw4by

Effects of Voluntary Alcohol Intake on Risk Preference and Behavioral Flexibility during Rat Adolescence

Matthew S. McMurray, Leslie R. Amodeo, Jamie D. Roitman, Robert Sutherland
2014 PLoS ONE  
to flexibly encode reward contingencies on behavioral responses.  ...  During adolescence (postnatal day 30-50), rats were given 1-hour access to either a 10% alcohol gelatin mixture (EtOH) or a calorie equivalent gelatin (Control) at the onset of the dark cycle.  ...  Acknowledgments We would like to acknowledge Dr. Linda Spear's assistance in experimental design, Dr.  ... 
doi:10.1371/journal.pone.0100697 pmid:25007338 pmcid:PMC4090063 fatcat:q2s5eh2nyvhrjk2lz3fzdh45ve

Network Architecture for Ultra Low Latency Applications

Patrick Fiati, K. Adu Boahen Opare
2021 Communications on Applied Electronics  
The application of 5G in IoT and vertical industries will bring more market space and present business opportunities to operators.  ...  It is common consensus that 5G will focus on the breakthroughs to support the expansion and enhancement of mobile internet and Internet of Things (IoT).  ...  It is expected to use a unified air interface and a hierarchical scheduling for both radio access and backhaul which enables flexible backhauling and low-cost ultra dense networking (UDN).  ... 
doi:10.5120/cae2021652887 fatcat:bmrji6u3dbd7xkzomtpemscpfa

Improving access for patients – a practice manager questionnaire

James G Meade, James S Brown
2006 BMC Family Practice  
The administrative and professional consequences of access targets for general practices, as detailed in the new GMS contract, are unknown.  ...  Practices with smaller list sizes were more likely than larger ones to utilise nurses in seeing extra patients (p = 0.007) or to undertake triage procedures (p = 0.062).  ...  Thanks also to Mr Eugene Gallagher for permission to conduct the study in the WHSSB area, and to both Professor Kernohan and Dr Bradbury of the University of Ulster for practical support and advice on  ... 
doi:10.1186/1471-2296-7-37 pmid:16784530 pmcid:PMC1570467 fatcat:qvxyafsp25brdmdk5gsuy5t2ty

Reusability of Functionality-Based Application Confinement Policy Abstractions [chapter]

Z. Cliffe Schreuders, Christian Payne
2008 Lecture Notes in Computer Science  
This approach provides a more flexible, scalable and easier to manage confinement paradigm that requires far less in terms of user expertise than existing schemes.  ...  This paper describes how the principles of role-based access control (RBAC) can be applied to the problem of restricting an application's behaviour.  ...  On the other hand, more finely-grained restricted access control policies are difficult and time-consuming to define and manage.  ... 
doi:10.1007/978-3-540-88625-9_14 fatcat:pum2gejqcvel5emubsr5hpzk7u
« Previous Showing results 1 — 15 out of 265,597 results