Introduction to algorithms
A new approach for delegation using hierarchical delegation tokens
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
Artificial Intelligence - Special issue on Robocop: the first step
Role delegation in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Role conflict and ambiguity: Critical variables in the MIS user-designer relationship
SIGCPR '80 Proceedings of the seventeenth annual computer personnel research conference
Role-assignment in open agent societies
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Role-based collaboration and its kernel mechanisms
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Roles in Information Systems: A Survey
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Engineering Open Complex Agent Systems: A Case Study
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Resource-Oriented Petri Net for Deadlock Avoidance in Flexible Assembly Systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Role Transfer Problems and Algorithms
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Adaptive Collaboration Based on the E-CARGO Model
International Journal of Agent Technologies and Systems
Role-Based Human-Computer Interactions
International Journal of Cognitive Informatics and Natural Intelligence
A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies
International Journal of Agent Technologies and Systems
Hi-index | 0.00 |
Many-to-many (M-M) role transfers are generalized problems that occur normally in collaboration, management, and the operation of organizations. This paper extends our previous work on role transfer. It is the first attempt to formalize the M-M role-transfer problems with real-world management examples, analyze the different cases of M-M problems, design algorithms for all the cases, implement all the algorithms to provide solutions, and discuss the future work. The significant contribution of this paper is to demonstrate that role-transfer problems have definite solutions. The implementations and their results validate the proposed algorithms.