Sciweavers

733 search results - page 106 / 147
» A Logic Programming View of Authorization in Distributed Sys...
Sort
View
CORR
2007
Springer
135views Education» more  CORR 2007»
15 years 3 months ago
The Unix KISS: A Case Study
In this paper we show that the initial philosophy used in designing and developing UNIX in early times has been forgotten due to “fast practices”. We question the leitmotif th...
Franco Milicchio
138
Voted
CORR
2007
Springer
172views Education» more  CORR 2007»
15 years 3 months ago
A Data-Parallel Version of Aleph
This is to present work on modifying the Aleph ILP system so that it evaluates the hypothesised clauses in parallel by distributing the data-set among the nodes of a parallel or di...
Stasinos Konstantopoulos
112
Voted
LCPC
2001
Springer
15 years 8 months ago
Strength Reduction of Integer Division and Modulo Operations
Integer division, modulo, and remainder operations are expressive and useful operations. They are logical candidates to express complex data accesses such as the wrap-around behav...
Jeffrey Sheldon, Walter Lee, Ben Greenwald, Saman ...
139
Voted
GECCO
2010
Springer
191views Optimization» more  GECCO 2010»
15 years 4 months ago
Fitness importance for online evolution
To complement standard fitness functions, we propose "Fitness Importance" (FI) as a novel meta-heuristic for online learning systems. We define FI and show how it can be...
Philip Valencia, Raja Jurdak, Peter Lindsay
133
Voted
SACMAT
2009
ACM
15 years 10 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...