Academic literature on the topic 'Context control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Context control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Context control"

1

Raitner, Marcus. "Context Not Control." Digitale Welt 4, no. 2 (March 11, 2020): 15. http://dx.doi.org/10.1007/s42354-020-0252-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dryden, Jean. "From Authority Control to Context Control." Journal of Archival Organization 5, no. 1-2 (January 7, 2008): 1–13. http://dx.doi.org/10.1300/j201v05n01_01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhou, Zhenji, Lifa Wu, and Zheng Hong. "Context-Aware Access Control Model for Cloud Computing." International Journal of Grid and Distributed Computing 6, no. 6 (December 31, 2013): 1–12. http://dx.doi.org/10.14257/ijgdc.2013.6.6.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Green, Leonard, and Edwin B. Fisher. "Self-control in context." Behavioral and Brain Sciences 11, no. 4 (December 1988): 684–85. http://dx.doi.org/10.1017/s0140525x00054030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schouppe, Nathalie, K. Richard Ridderinkhof, Tom Verguts, and Wim Notebaert. "Context-specific control and context selection in conflict tasks." Acta Psychologica 146 (February 2014): 63–66. http://dx.doi.org/10.1016/j.actpsy.2013.11.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ben-Gal, Irad, Gail Morag, and Armin Shmilovici. "Context-Based Statistical Process Control." Technometrics 45, no. 4 (November 2003): 293–311. http://dx.doi.org/10.1198/004017003000000122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

James, N. "People's finds: context and control." Antiquity 85, no. 329 (August 2011): 1068–72. http://dx.doi.org/10.1017/s0003598x00068514.

Full text
Abstract:
What should professional archaeologists do about objects discovered by amateurs? The best known cases involve metal-detectorists who, under the English 'Treasure Act (1996), are permitted to make agreements with land-owners to search for antiquities and keep them, although the Portable Antiquities Scheme (PAS; set up to complement the Act's provisions) encourages them to have their finds registered by an archaeologist. There is no doubt that this has greatly increased knowledge of artefacts discovered in England where, in the past decade, the annual number of 'portable antiquities formally reported has risen steeply (Bland 2008: 71). The British Museum is now promoting a code of practice (Bland 2008: 81–2); and, at pains to avoid counterposing professional archaeologists and amateurs, it is encouraging the opportunities for outreach and 'community archaeology' (British Museum n.d.: 16–18). Thus Bland (2008: 80) welcomes collective knowledge . . . founded on public . . . participation' rather than . . . research . . . conceived and executed by professionals'. Yet there are now fresh anxieties about preservation at detectorists' sites (Pestell & Ulmschneider 2003: 9–10; Wilson 2009; Plouviez 2010).
APA, Harvard, Vancouver, ISO, and other styles
8

Mey, Jacob L. "Text, context, and social control." Journal of Pragmatics 16, no. 5 (November 1991): 399–410. http://dx.doi.org/10.1016/0378-2166(91)90133-i.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vetter, Philipp, and Daniel M. Wolpert. "Context Estimation for Sensorimotor Control." Journal of Neurophysiology 84, no. 2 (August 1, 2000): 1026–34. http://dx.doi.org/10.1152/jn.2000.84.2.1026.

Full text
Abstract:
Human motor behavior is remarkably accurate and appropriate even though the properties of our own bodies as well as the objects we interact with vary over time. To adjust appropriately, the motor system has to estimate the context, that is the properties of objects in the world and the prevailing environmental conditions. Here we show that to determine the current context the CNS uses information from both prior knowledge of how the context might evolve over time and from the comparison of predicted and actual sensory feedback. We show that these two sources of information may be modeled within the CNS and combined to derive an accurate estimate of the context which adjusts motor command selection. This provides a novel probabilistic framework for sensorimotor control.
APA, Harvard, Vancouver, ISO, and other styles
10

Dankbaar, Ben. "Embeddedness, context, proximity and control." European Planning Studies 12, no. 5 (July 2004): 691–701. http://dx.doi.org/10.1080/0965431042000220020.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Context control"

1

Belotti, Rudi. "SOPHIE: context modelling and control." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Global Information Systems Group, 2004. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vetter, Philipp. "Context estimation in sensorimotor control." Thesis, University College London (University of London), 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Almutairi, Abdulgader. "Context-aware and adaptive usage control model." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9592.

Full text
Abstract:
Information protection is a key issue for the acceptance and adoption of pervasive computing systems where various portable devices such as smart phones, Personal Digital Assistants (PDAs) and laptop computers are being used to share information and to access digital resources via wireless connection to the Internet. Because these are resources constrained devices and highly mobile, changes in the environmental context or device context can affect the security of the system a great deal. A proper security mechanism must be put in place which is able to cope with changing environmental and system context. Usage CONtrol (UCON) model is the latest major enhancement of the traditional access control models which enables mutability of subject and object attributes, and continuity of control on usage of resources. In UCON, access permission decision is based on three factors: authorisations, obligations and conditions. While authorisations and obligations are requirements that must be fulfilled by the subject and the object, conditions are subject and object independent requirements that must be satisfied by the environment. As a consequence, access permission may be revoked (and the access stopped) as a result of changes in the environment regardless of whether the authorisations and obligations requirements are met. This constitutes a major shortcoming of the UCON model in pervasive computing systems which constantly strive to adapt to environmental changes so as to minimise disruptions to the user. We propose a Context-Aware and Adaptive Usage Control (CA-UCON) model which extends the traditional UCON model to enable adaptation to environmental changes in the aim of preserving continuity of access. Indeed, when the authorisation and obligations requirements are fulfilled by the subject and object, and the conditions requirements fail due to changes in the environmental or the system context, our proposed model CA-UCON triggers specific actions in order to adapt to the new situation, so as to ensure continuity of usage. We then propose an architecture of CA-UCON model, presenting its various components. In this model, we integrated the adaptation decision with usage decision architecture, the comprehensive definition of each components and reveals the functions performed by each components in the architecture are presented. We also propose a novel computational model of our CA-UCON architecture. This model is formally specified as a finite state machine. It demonstrates how the access request of the subject is handled in CA-UCON model, including detail with regards to revoking of access and actions undertaken due to context changes. The extension of the original UCON architecture can be understood from this model. The formal specification of the CA-UCON is presented utilising the Calculus of Context-aware Ambients (CCA). This mathematical notation is considered suitable for modelling mobile and context-aware systems and has been preferred over alternatives for the following reasons: (i) Mobility and Context awareness are primitive constructs in CCA; (ii) A system's properties can be formally analysed; (iii) Most importantly, CCA specifications are executable allowing early validation of system properties and accelerated development of prototypes. For evaluation of CA-UCON model, a real-world case study of a ubiquitous learning (u-learning) system is selected. We propose a CA-UCON model for the u-learning system. This model is then formalised in CCA and the resultant specification is executed and analysed using an execution environment of CCA. Finally, we investigate the enforcement approaches for CA-UCON model. We present the CA-UCON reference monitor architecture with its components. We then proceed to demonstrate three types of enforcement architectures of the CA-UCON model: centralised architecture, distributed architecture and hybrid architecture. These are discussed in detail, including the analysis of their merits and drawbacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Kaining. "Context-based coalition access control for ubiquitous computing." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27193.

Full text
Abstract:
The need for coalition access control among individuals and organizations has increased significantly in the past years as the need for spontaneous access to information increases. However, a significant deterrent to the ability to connect in a spontaneous manner in coalition collaborative applications is the difficulty in users from different domains being able to access resources or services located and owned by other entities. Coalition access control encompasses control mechanisms dealing with access between users of two or more different organizations or enterprises. These users could be co-located or remotely located. The thesis first presents a delegation based D-TMAC model that extends traditional TMAC across organizations for formal coalition environments, and a context-based coalition access control model, which apply context information as conditions on delegation. Then the thesis proposes a Session-based Coalition Access Control Architecture (SCACA) and provides practical implementation that enables dynamic coalition access control over a communication session in a spontaneous manner. The presented system architecture and methodology leverages the IETF SIP protocol as an underlying communication mechanism in order to greatly minimize the administration overhead and rapidly adapt the dynamic nature of access control in spontaneous coalition environments. The result is that, during a spontaneous coalition communication across organizations, every endpoint can access other endpoints' resources and share its own resources to all the other endpoints as well. Moreover, these privileges will dynamically change as the status of the coalition communication changes.
APA, Harvard, Vancouver, ISO, and other styles
5

Saleem, Ahmad Nadeem. "Control, conflict, and motivation in socio-cultural context." Thesis, Middlesex University, 1998. http://eprints.mdx.ac.uk/8019/.

Full text
Abstract:
The central argument of this thesis is that unlike in the West, organizational behavior in the Middle East and the Indian sub-continent is, predominantly, not a function of work/task related imperatives but largely determined by the broader socio-cultural context, norms and values of the respective societies. Based on extensive interviews and participant and nonparticipant observation in the Middle East and sub-continent, and content analysis of media reports and lìterature, the effects of the respective socio-cultural contexts are documented in terms of three key determinants of organizational behavior, conflict, control and motivation. The thesis examines traditional and modern 'Western' sources of literature regarding control, conflict and motivation and the nature of culture itself and draws attention to the need for modification in certain 'Euroamerican' theories when applied to the strong social, familial and cultural structures, values, beliefs and assumptions present in the two other cultures investigated. Recommendations are put forward as to the kind of changes in the socio-cultural context of the Middle East and Indian sub-continent, if organizational behavior is to be transformed. In conclusion, a picture emerges of the stark differences between the cultures in terms of status, incomes, role of family and state, social control, family structure, population pressures and religious control - all of which are evidence of the predominance of the sociocultural context in determining organizational behavior. A theory is offered stating that organizational behavior is primarily a derivative of the structures and functions of broader socio-cultural institutions. A corollary of the said theory is that patterns of control, conflict, and motivation are strongly influenced by the structural-functional properties of a socio-cultural system, and hence, 'intrinsic motivation' is a rare phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmed, Ali Ahmed Ali. "Context-aware access control in ubiquitous computing (CRAAC)." Thesis, University of Manchester, 2010. https://www.research.manchester.ac.uk/portal/en/theses/contextaware-access-control-in-ubiquitous-computing-craac(1eaa4390-7062-4af5-8aa5-d645d91fa547).html.

Full text
Abstract:
Ubiquitous computing (UbiComp) envisions a new computing environment, where computing devices and related technology are widespread (i.e. everywhere) and services are provided at anytime. The technology is embedded discreetly in the environment to raise users' awareness. UbiComp environments support the proliferation of heterogeneous devices such as embedded computing devices, personal digital assistants (PDAs), wearable computers, mobile phones, laptops, office desktops (PCs), and hardware sensors. These devices may be interconnected by common networks (e.g. wired, wireless), and may have different levels of capabilities (i.e. computational power, storage, power consumption, etc). They are seamlessly integrated and interoperated to provide smart services (i.e. adaptive services). A UbiComp environment provides smart services to users based on the users' and/or system's current contexts. It provides the services to users unobtrusively and in turn the user's interactions with the environment should be as non-intrusive and as transparent as possible. Access to such smart services and devices must be controlled by an effective access control system that adapts its decisions based on the changes in the surrounding contextual information. This thesis aims at designing an adaptive fine-grained access control solution that seamlessly fits into UbiComp environments. The solution should be flexible in supporting the use of different contextual information and efficient, in terms of access delays, in controlling access to resources with divergent levels of sensitivity. The main contribution of this thesis is the proposal of the Context-Risk-Aware Access Control (CRAAC) model. CRAAC achieves fine-grained access control based upon the risk level in the underlying access environment and/or the sensitivity level of the requested resource object. CRAAC makes new contributions to the access control field, those include 1) introducing the concept of level of assurance based access control, 2) providing a method to convert the contextual attributes values into the corresponding level of assurance, 3) Proposing two methods to aggregate the set of level of assurance into one requester level of assurance, 4) supporting four modes of working each suits a different application context and/or access control requirements, 5) a comprehensive access control architecture that supports the CRAAC four modes of working, and 6) an evaluation of the CRAAC performance at runtime.
APA, Harvard, Vancouver, ISO, and other styles
7

Nguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Awwad, Tarek. "Context-aware worker selection for efficient quality control in crowdsourcing." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI099/document.

Full text
Abstract:
Le crowdsourcing est une technique qui permet de recueillir une large quantité de données d'une manière rapide et peu onéreuse. Néanmoins, La disparité comportementale et de performances des "workers" d’une part et la variété en termes de contenu et de présentation des tâches par ailleurs influent considérablement sur la qualité des contributions recueillies. Par conséquent, garder leur légitimité impose aux plateformes de crowdsourcing de se doter de mécanismes permettant l’obtention de réponses fiables et de qualité dans un délai et avec un budget optimisé. Dans cette thèse, nous proposons CAWS (Context AwareWorker Selection), une méthode de contrôle de la qualité des contributions dans le crowdsourcing visant à optimiser le délai de réponse et le coût des campagnes. CAWS se compose de deux phases, une phase d’apprentissage opérant hors-ligne et pendant laquelle les tâches de l’historique sont regroupées de manière homogène sous forme de clusters. Pour chaque cluster, un profil type optimisant la qualité des réponses aux tâches le composant, est inféré ; la seconde phase permet à l’arrivée d’une nouvelle tâche de sélectionner les meilleurs workers connectés pour y répondre. Il s’agit des workers dont le profil présente une forte similarité avec le profil type du cluster de tâches, duquel la tâche nouvellement créée est la plus proche. La seconde contribution de la thèse est de proposer un jeu de données, appelé CrowdED (Crowdsourcing Evaluation Dataset), ayant les propriétés requises pour, d’une part, tester les performances de CAWS et les comparer aux méthodes concurrentes et d’autre part, pour tester et comparer l’impact des différentes méthodes de catégorisation des tâches de l’historique (c-à-d, la méthode de vectorisation et l’algorithme de clustering utilisé) sur la qualité du résultat, tout en utilisant un jeu de tâches unique (obtenu par échantillonnage), respectant les contraintes budgétaires et gardant les propriétés de validité en terme de dimension. En outre, CrowdED rend possible la comparaison de méthodes de contrôle de qualité quelle que soient leurs catégories, du fait du respect d’un cahier des charges lors de sa constitution. Les résultats de l’évaluation de CAWS en utilisant CrowdED comparés aux méthodes concurrentes basées sur la sélection de workers, donnent des résultats meilleurs, surtout en cas de contraintes temporelles et budgétaires fortes. Les expérimentations réalisées avec un historique structuré en catégories donnent des résultats comparables à des jeux de données où les taches sont volontairement regroupées de manière homogène. La dernière contribution de la thèse est un outil appelé CREX (CReate Enrich eXtend) dont le rôle est de permettre la création, l’extension ou l’enrichissement de jeux de données destinés à tester des méthodes de crowdsourcing. Il propose des modules extensibles de vectorisation, de clusterisation et d’échantillonnages et permet une génération automatique d’une campagne de crowdsourcing
Crowdsourcing has proved its ability to address large scale data collection tasks at a low cost and in a short time. However, due to the dependence on unknown workers, the quality of the crowdsourcing process is questionable and must be controlled. Indeed, maintaining the efficiency of crowdsourcing requires the time and cost overhead related to this quality control to stay low. Current quality control techniques suffer from high time and budget overheads and from their dependency on prior knowledge about individual workers. In this thesis, we address these limitation by proposing the CAWS (Context-Aware Worker Selection) method which operates in two phases: in an offline phase, the correlations between the worker declarative profiles and the task types are learned. Then, in an online phase, the learned profile models are used to select the most reliable online workers for the incoming tasks depending on their types. Using declarative profiles helps eliminate any probing process, which reduces the time and the budget while maintaining the crowdsourcing quality. In order to evaluate CAWS, we introduce an information-rich dataset called CrowdED (Crowdsourcing Evaluation Dataset). The generation of CrowdED relies on a constrained sampling approach that allows to produce a dataset which respects the requester budget and type constraints. Through its generality and richness, CrowdED helps also in plugging the benchmarking gap present in the crowdsourcing community. Using CrowdED, we evaluate the performance of CAWS in terms of the quality, the time and the budget gain. Results shows that automatic grouping is able to achieve a learning quality similar to job-based grouping, and that CAWS is able to outperform the state-of-the-art profile-based worker selection when it comes to quality, especially when strong budget ant time constraints exist. Finally, we propose CREX (CReate Enrich eXtend) which provides the tools to select and sample input tasks and to automatically generate custom crowdsourcing campaign sites in order to extend and enrich CrowdED
APA, Harvard, Vancouver, ISO, and other styles
9

Crump, Matthew John Charles Milliken Bruce. "Context-specific learning and control: An instance based view of flexible online control." *McMaster only, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Prouzeau, Arnaud. "Collaboration around wall displays in command and control contexts." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLS544/document.

Full text
Abstract:
Dans cette thèse, j’étudie les avantages des Murs d’Écran Interactif à Haute Résolution(UHRIWD - Ultra High Resolution Interactive Wall Displays) pour la collaboration. Je me concentre sur uncontexte de collaboration bien précis: la surveillance des systèmes critiques dans les salles de contrôle. Desvisites de ces salles et ainsi que des interviews avec des opérateurs montrent qu’une collaborationplus ou moins étroite est nécessaire en fonction de la situation. C’est lorsqu’une collaboration étroiteest nécessaire que je pense qu’un UHRIWD peut être bénéfique pour celle ci. Je montre d’abordqu’un mur d’écran encourage la collaboration étroite comparée à l’utilisation de plusieurs postes detravail individuels. Puis je montre comment une technique d’interaction peut avoir une influence sur letype de collaboration. Par exemple, une technique avec une large empreinte visuelle va encouragerune collaboration plus étroite. J’applique cela dans la conception de techniques pour afficher desprédictions de trafic parallèlement au trafic en temps réel dans une salle de contrôle de trafic routier.Pour finir, je propose des techniques pour faciliter les transitions entre les différents écrans d’unesalle de contrôle
In this thesis, I study the benefits of collaboration in front of Ultra-High ResolutionInteractive Wall Displays (UHRWD). I focus on the specific collaborative context of control rooms.Visits of control rooms and interviews with operators show that different degrees of collaboration arerequired in function of the situation. I believe that a UHRIWD could be beneficial in situations whenclose collaboration is needed. I first show that wall display encourages close collaboration comparedto multiple separate displays. Then I show that the interaction techniques can also influence thedegree of collaboration, for instance, a technique with a large visual footprint also encourages a closecollaboration. I apply this in the design of technique to visualize road traffic forecast on a wall displayfor road traffic control centres. Finally, I propose techniques to help the transition between thedifferent setups of a control room: the workstations and the wall display
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Context control"

1

Brown, Matthew H. Emissions control: The technology context. Denver, Colo: National Conference of State Legislatures, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hollnagel, Erik. Human reliability analysis: Context and control. London: Academic Press, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

E, Dryden Jean, ed. Respect for authority: Authority control, context control, and archival description. Binghamton, NY: Haworth Information Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dryden, Jean. Respect for Authority: Authority Control, Context Control, and Archival Description. Edited by Jean Dryden. Respect for Authority: Authority Control, Context Control, and Archival Description has been co-published simultaneously as Journal of Archival Organization, Volume 5, Numbers 1/2 2007.: Routledge, 2018. http://dx.doi.org/10.4324/9781315877556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hassel, Lars. The effectiveness of budgetary control in a multinational context. Abo̊: Abo̊ Academy Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Henry, Stuart. The hidden economy: The context and control of borderline crime. Port Townsend, Wash: Loompanics Unlimited, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maonera, Felix. Zimbabwe's control over its natural resources in the WTO context. Harare]: SEATINI, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wheatstone, Margaret. Computers and privacy in a Canadian context. [Peterborough, Ont: s.n.], 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Minority group threat, crime, and policing: Social context and social control. New York: Praeger, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Booth, Peter. Management control in a voluntary organization: Accounting and accountants inorganizational context. New York: Garland, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Context control"

1

Berry, Anthony J., Jane Broadbent, and David Otley. "The context of control." In Management Control, 61–73. London: Macmillan Education UK, 1995. http://dx.doi.org/10.1007/978-1-349-23912-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Berry, Aidan, and Robin Jarvis. "Planning and control." In Accounting in a Business Context, 261–75. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-6942-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Berry, Aidan, and Robin Jarvis. "Planning and control." In Accounting in a Business Context, 211–24. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-6944-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cairney, Paul, Donley T. Studlar, and Hadii M. Mamudu. "The Global Policy Context." In Global Tobacco Control, 45–71. London: Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9780230361249_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dryden, Jean. "From Authority Control to Context Control." In Respect for Authority: Authority Control, Context Control, and Archival Description, 1–13. Respect for Authority: Authority Control, Context Control, and Archival Description has been co-published simultaneously as Journal of Archival Organization, Volume 5, Numbers 1/2 2007.: Routledge, 2018. http://dx.doi.org/10.4324/9781315877556-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mishra, Ramesh Kumar. "Bilingualism, Context and Control." In Bilingualism and Cognitive Control, 113–32. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92513-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bugg, Julie M. "Context, Conflict, and Control." In The Wiley Handbook of Cognitive Control, 79–96. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118920497.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Wahah, Mouiad, and Csilla Farkas. "Context Delegation for Context-Based Access Control." In ECML PKDD 2018 Workshops, 201–10. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-13453-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harrod, Ryan P. "Putting Chaco into Context." In The Bioarchaeology of Social Control, 71–81. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59516-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Masoumzadeh, Amir Reza, Morteza Amini, and Rasool Jalili. "Context-Aware Provisional Access Control." In Information Systems Security, 132–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Context control"

1

Fernandez, Eduardo B., Maria M. Larrondo-Petrie, and Alvaro E. Escobar. "Contexts and Context-Based Access Control." In 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07). IEEE, 2007. http://dx.doi.org/10.1109/icwmc.2007.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rahmati, Amir, and Harsha V. Madhyastha. "Context-Specific Access Control." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808117.2808121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rubart, Jessica. "Context-based access control." In the 2005 symposia. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1234324.1234337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hulsebosch, R. J., A. H. Salden, M. S. Bargh, P. W. G. Ebben, and J. Reitsma. "Context sensitive access control." In the tenth ACM symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1063979.1064000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Suyama, Koichi. "Context-based reliable control." In 2001 European Control Conference (ECC). IEEE, 2001. http://dx.doi.org/10.23919/ecc.2001.7076092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lachmund, Sven, Thomas Walter, Laurent Gomez, Laurent Bussard, and Eddy Olk. "Context-Aware Access Control; Making Access Control Decisions Based on Context Information." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lachmund, Sven, Thomas Walter, Laurent Gomez, Laurent Bussard, and Eddy Olk. "Context-Aware Access Control Making Access Control Decisions Based on Context Information." In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oluwatimi, Oyindamola, Daniele Midi, and Elisa Bertino. "A Context-Aware System to Secure Enterprise Content." In SACMAT 2016: The 21st ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2914642.2914648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Suyama, K., and G. Apostolakis. "A context-based approach to reliable control: context-dependent performance." In Proceedings of American Control Conference. IEEE, 2001. http://dx.doi.org/10.1109/acc.2001.945856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"CoP3D: CONTEXT-AWARE OVERLAY TREE FOR CONTENT-BASED CONTROL SYSTEMS." In 6th International Conference on Informatics in Control, Automation and Robotics. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002247703050310.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Context control"

1

Miller, Karen. Nuclear Arms Control: History & Policy Context. Office of Scientific and Technical Information (OSTI), August 2021. http://dx.doi.org/10.2172/1812629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Campbell, B., and R. Sparks. Control of Service Context using SIP Request-URI. RFC Editor, April 2001. http://dx.doi.org/10.17487/rfc3087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Borrie, John, and Lewis A. Dunn. The Strategic Context for Nuclear Disarmament, Deterrence and Strategic Arms Control Dialogue. UNIDIR, November 2020. http://dx.doi.org/10.37559/wmd/20/ddac/01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Peterson, A. S., and Sholom G. Cohen. A Context Analysis of the Movement Control Domain for the Army Tactical Command and Control System (ATCCS). Fort Belvoir, VA: Defense Technical Information Center, April 1991. http://dx.doi.org/10.21236/ada248117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wunderlich, Carmen, Harald Müller, and Una Jakob. WMD Compliance and Enforcement in a Changing Global Context. The United Nations Institute for Disarmament Research, May 2020. http://dx.doi.org/10.37559/wmd/21/wmdce02.

Full text
Abstract:
The regimes for the control of weapons of mass destruction (WMD) are essential ingredients of the global order. Yet this order is currently in transition: the bipolarity of the Cold War has given way to a more complex, multipolar world order characterized by conflicts of interest and great power competition rather than cooperative security. This competition brings with it rising strategic uncertainties which endanger stability and have far reaching implications for WMD-related agreements. To better understand the implications of this changing global context for WMD arms control and disarmament measures this report looks at the past, present and future prospects for WMD-related treaties. The report begins by outlining four broad yet interlinked approaches to arms control and disarmament before considering how these have been applied to chemical, biological and nuclear weapons in the past and how these measures could be applied in the future.
APA, Harvard, Vancouver, ISO, and other styles
6

Pounds, T. Monitoring technologies in conventional arms control verification: The CFE (Conventional Armed Forces in Europe) context. Office of Scientific and Technical Information (OSTI), June 1990. http://dx.doi.org/10.2172/7076228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Carvalho, Rita, João Tavares, and Liliana Sousa. Instruments for assessing loneliness in older people in Portugal: a Scoping Review protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, October 2021. http://dx.doi.org/10.37766/inplasy2021.10.0002.

Full text
Abstract:
Review question / Objective: The objective of this scoping review is to map the instruments validate for the Portuguese older population (65+ years old) that assess loneliness; and to identify their psychometric properties and contexts where they have been in use. The questions for this scoping review are: What are the validated instruments for Portugal that assess loneliness in the older individuals? What are the psychometric properties of those instruments? In which contexts were the loneliness assessment instruments used? Eligibility criteria: Participants – This scoping review will consider all studies that included older adults with 65 years and over. Concept – This review will be included studies that assess loneliness or cover loneliness by validated instruments that address different dimensions, including, but not limited to, emotional or social. Context – This scoping review will consider studies that used validated instruments the loneliness in Portuguese older adults including, but not limited to the context of community, intermediate care, long-term care or acute care. Types of sources - This scoping review will consider quantitative and mixed-method studies. In the quantitative designs include experimental, quasi-experimental, observational and analytical observational studies including prospective and retrospective cohort studies, case-control studies, and analytical cross-sectional studies will be considered for inclusion. This review will also consider descriptive observational study designs including case series, individual case reports, and descriptive cross-sectional studies for inclusion.
APA, Harvard, Vancouver, ISO, and other styles
8

Nottingham, M. HTTP Cache-Control Extensions for Stale Content. RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weinberg, Zwi G., Adegbola Adesogan, Itzhak Mizrahi, Shlomo Sela, Kwnag Jeong, and Diwakar Vyas. effect of selected lactic acid bacteria on the microbial composition and on the survival of pathogens in the rumen in context with their probiotic effects on ruminants. United States Department of Agriculture, January 2014. http://dx.doi.org/10.32747/2014.7598162.bard.

Full text
Abstract:
This research project was performed in context of the apparent probiotic effect of selected lactic acid bacteria (LAB) silage inoculants on the performance of ruminants (improved feed intake, faster live-weight gain, higher milk yields and improved feed efficiency). The overall objective was to find out how LAB affect ruminant performance. The project included several “chapters” as follows: 1. The effect of LAB silage inoculants on the survival of detrimental bacteria in rumen fluid, in vitro study (Weinberg et al., The Volcani Center). An in vitro model was developed to study the interaction between selected LAB and an E. coli strain tagged with green fluorescence protein (GFP) in buffered RF. Results indicated that both LAB inoculants and E. coli survived in the RF for several days; both LAB inoculants and LAB-treated silages did not affect survival of E. coli in rumen fluid in vitro. The effect of feeding baled wheat silages treated with or without three selected LAB silage inoculants on the performance of high-lactating cows (Weinberg et al., The Volcani Center). Treatments included control (no additive), Lacobacillusbuchneri40788 (LB), Lactobacillus plantarumMTD1 40027 (LP) and Pediococcuspentosaceus30168 (PP), each applied at 10⁶ cfu/g FM. The silages were included in the TMR of 32 high milking Holstein cows in a controlled feeding experiment. All baled silages were of good quality. The LB silage had the numerically highest acetic acid and were the most stable upon aerobic exposure. The cows fed the LB silages had the highest daily milk yields, percent milk fat and protein. The microbiome of baled wheat silages and changes during ensiling of wheat and corn (Sela et al., The Volcani Center). Bacterial community of the baled silages was dominated mainly of two genera in total, dominated by Lactobacillus and Clostridium_sensu_stricto_12 with 300 other genera at very low abundance. Fungal community was composed mainly of two genera in total, dominated by Candida and Monascuswith 20 other genera at very low abundance. In addition, changes in the microbiome during ensiling of wheat and corn with and without addition of L. plantarumMTD1 was studied in mini-silos. Overall 236 bacterial genera were identified in the fresh corn but after 3 months Lactobacillus outnumbered all other species by acquiring 95% of relative abundance. The wheat silage samples are still under analysis. The effect of applying LAB inoculants at ensiling on survival of E. coli O157:H7 in alfalfa and corn silages(Adesogan et al., University of Florida). E. coli (10⁵ cfu/g) was applied to fresh alfalfa and corn at ensiling with or without L. plantarumor L. buchneri. The pathogen was added again after about 3 moths at the beginning of an aerobic exposure period. The inoculants resulted in faster decrease in pH as compared with the control (no additives) or E. coli alone and therefore, the pathogen was eliminated faster from these silages. After aerobic exposure the pathogen was not detected in the LAB treated silages, whereas it was still present in the E. coli alone samples. 5. The effect of feeding corn silage treated with or without L. buchnerion shedding of E. coli O157:H7 by dairy cows (Adesogan et al., UFL). BARD Report - Project 4704 Page 2 of 12 Five hundred cows from the dairy herd of the University of Florida were screened for E. coli shedding, out of which 14 low and 13 high shedders were selected. These cows were fed a total mixed ration (TMR) which was inoculated with E. coli O157:H7 for 21 days. The TMR included corn silage treated with or without L. buchneri. The inoculated silages were more stable upon aerobic exposure than the control silages; the silage inoculant had no significant effect on any milk or cow blood parameters. However, the silage inoculant tended to reduce shedding of E. coli regardless of high or low shedders (p = 0.06). 6. The effect of feeding baled wheat silages treated with or without three selected LAB silage inoculants on the rumen microbiome (Mizrahi et al., BGU). Rumen fluid was sampled throughout the feeding experiment in which inoculated wheat silages were included in the rations. Microbial DNA was subsequently purified from each sample and the 16S rRNA was sequenced, thus obtaining an overview of the microbiome and its dynamic changes for each experimental treatment. We observed an increase in OTU richness in the group which received the baled silage inoculated with Lactobacillus Plantarum(LP). In contrast the group fed Lactobacillus buchneri(LB) inoculated silage resulted in a significant decrease in richness. Lower OTU richness was recently associated in lactating cows with higher performance (Ben Shabatet al., 2016). No significant clustering could be observed between the different inoculation treatments and the control in non metric multi-dimentional scaling, suggesting that the effect of the treatments is not the result of an overall modulation of the microbiome composition but possibly the result of more discrete interactions. Significant phylum level changes in composition also indicates that no broad changes in taxa identity and composition occurred under any treatment A more discrete modulation could be observed in the fold change of several taxonomic groups (genus level analysis), unique to each treatment, before and after the treatment. Of particular interest is the LB treated group, in which several taxa significantly decreased in abundance. BARD Report - Project 4704 Page 3 of 12
APA, Harvard, Vancouver, ISO, and other styles
10

Murray, R., and B. Niven-Jenkins. Content Delivery Network Interconnection (CDNI) Control Interface / Triggers. RFC Editor, December 2016. http://dx.doi.org/10.17487/rfc8007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography