http://www.w3.org/ns/prov#value | - Referring to FIG. 4, a constraint-driven method for formulating a plan to secure access to limited resources over a delivery system is shown in its preferred embodiment including four main processes operating on a representation of a delivery system, storing values commonly accessible by other methods outside the invention, and an interface.
|