Sciweavers

665 search results - page 124 / 133
» A proposal for an owl rules language
Sort
View
96
Voted
TCS
2008
14 years 9 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
XSYM
2010
Springer
148views Database» more  XSYM 2010»
14 years 7 months ago
Promoting the Semantic Capability of XML Keys
Keys for XML data trees can uniquely identify nodes based on the data values on some of their subnodes, either in the entire tree or relatively to some selected subtrees. Such keys...
Flavio Ferrarotti, Sven Hartmann, Sebastian Link, ...
ATVA
2010
Springer
142views Hardware» more  ATVA 2010»
14 years 7 months ago
On Scenario Synchronization
: Narrowing the wide conceptual gap between problem and implementation domains is considered a significant factor within software engineering. Currently, such a relation is often o...
Duc-Hanh Dang, Anh-Hoang Truong, Martin Gogolla
SEMWEB
2010
Springer
14 years 7 months ago
Combining Approximation and Relaxation in Semantic Web Path Queries
We develop query relaxation techniques for regular path queries and combine them with query approximation in order to support flexible querying of RDF data when the user lacks know...
Alexandra Poulovassilis, Peter T. Wood
CLEIEJ
2010
14 years 6 months ago
Typing Textual Entities and M2T/T2M Transformations in a Model Management Environment
Global Model Management (GMM) is a model-based approach for managing large sets of interrelated heterogeneous and complex MDE artifacts. Such artifacts are usually represented as ...
Andrés Vignaga