نتایج جستجو برای: conflict detection

تعداد نتایج: 645994  

2007
Taghrid Samak

Policy-based network management is a necessity in large scale management environment. It provides means for separating high level system requirements from actual implementations. As the network size increases, the need for automatic tools to perform management increases rapidly. In Differentiated Services (DiffServ), policies can be used to dynamically reconfigure routers such that the desired ...

1999
Maria Prandini John Lygeros Arnab Nilim Shankar Sastry

A PROBABILISTIC FRAMEWORK FOR AIRCRAFT CONFLICT DETECTION Maria Prandini, John Lygeros, Arnab Nilim and Shankar Sastry Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley CA 94720 fprandini, lygeros, nilim, [email protected] ABSTRACT We describe a general con ict detection/resolution scheme, focusing on the con ict detection ...

2013
Dandan Tang Li Hu Hong Li Qinglin Zhang Antao Chen

BACKGROUND For optimal performance in conflict situations, conflict adaptation (conflict detection and adjustment) is necessary. However, the neural dynamics of conflict adaptation is still unclear. METHODS In the present study, behavioral and electroencephalography (EEG) data were recorded from seventeen healthy participants during performance of a color-word Stroop task with a novel look-to...

2003
Pepijn J. de Langen Ben H.H. Juurlink

Nearly all modern computing systems employ caches to hide the memory latency. Modern processors often employ multiple levels of cache, with one or more levels on the same die as the processor core. As performance demands increase, it becomes increasingly important for an on-die cache structure to perform well. Inefficient use of the available cache space can become increasingly costly in terms ...

1999
Maria Prandini John Lygeros Arnab Nilim Shankar Sastry

A mid-range conflict alerting system is proposed, based on a measure of criticality which directly takes into account the uncertainty in the prediction of the aircraft positions. The use of randomized algorithms makes the computation of the criticality measure tractable. The performance of the algorithm is evaluated by Monte Carlo simulation on a stochastic ODE model of the aircraft motion.

Journal: :EURASIP J. Information Security 2014
Nada Essaouini Frédéric Cuppens Nora Cuppens-Boulahia Anas Abou El Kalam

Many papers have already provided models to formally specify security policies. In this paper, security policies are modeled using deontic concepts of permission and obligation. Permission rules are used to specify access control policies, while obligation rules are useful to specify other security requirements corresponding to usage control policies as the availability of information in its al...

2013
Tingting Li Tina Balke Marina De Vos Julian Padget Ken Satoh

The human reasoning process used in conducting arguments to resolve conflicts and reach a decision is an interdisciplinary study. Modelling argumentation has a great impact on the development of theories and applications in AI especially in critical domains that involve richness of reasoning such as Law. Therefore, argumentation has been recognised as a core topic in AI and Law. Developing comp...

2014
Alix Trieu Robert Dockins Andrew Tolmach

We present a static control flow analysis used in the Simple Unified Policy Programming Language (Suppl) compiler to detect internally inconsistent policies. For example, an access control policy can decide to both “allow” and “deny” access for a user; such an inconsistency is called a conflict. Policies in Suppl follow the Event-Condition-Action paradigm; predicates are used to model condition...

Journal: :International journal of psychophysiology : official journal of the International Organization of Psychophysiology 2017
Blair Saunders Hause Lin Marina Milyavskaya Michael Inzlicht

The detection of conflict between incompatible impulses, thoughts, and actions is a ubiquitous source of motivation across theories of goal-directed action. In this overview, we explore the hypothesis that conflict is emotive, integrating perspectives from affective science and cognitive neuroscience. Initially, we review evidence suggesting that the mental and biological processes that monitor...

2006
M. Hall-May T. P. Kelly

Safety policy sets out the rules that govern safe system interaction within a system of systems (SoS). These rules are derived from high-level policy goals informed by a hazard analysis. They are expressed in terms of behaviour that the system is allowed to exhibit and that which it is required to exhibit. Nevertheless, this process can lead to describing rules that conflict with one another, b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید