Sciweavers

273 search results - page 41 / 55
» A Compositional Semantics for Conditional Term Rewriting Sys...
Sort
View
CCS
2004
ACM
15 years 5 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers
70
Voted
JANCL
2008
133views more  JANCL 2008»
14 years 11 months ago
Modal logic and invariance
Consider any logical system, what is its natural repertoire of logical operations? This question has been raised in particular for first-order logic and its extensions with genera...
Johan van Benthem, Denis Bonnay
ICASSP
2011
IEEE
14 years 3 months ago
A comparative analysis of dynamic network decoding
The use of statically compiled search networks for ASR systems using huge vocabularies and complex language models often becomes challenging in terms of memory requirements. Dynam...
David Rybach, Ralf Schlüter, Hermann Ney
FASE
2001
Springer
15 years 4 months ago
A CSP View on UML-RT Structure Diagrams
Abstract. UML-RT is an extension of UML for modelling embedded reactive and real-time software systems. Its particular focus lies on system descriptions on the architectural level,...
Clemens Fischer, Ernst-Rüdiger Olderog, Heike...
VLDB
1993
ACM
113views Database» more  VLDB 1993»
15 years 3 months ago
An Active Object-Oriented Database: A Multi-Paradigm Approach to Constraint Management
Mb describe the design and implementation of a constraint management facility for our active object-oriented database system called Jasmine/A. The facility includes integrity cons...
Hiroshi Ishikawa, Kazumi Kubota