Sciweavers

2364 search results - page 421 / 473
» An Engine for Computing Well-Founded Models
Sort
View
TOPLAS
2010
93views more  TOPLAS 2010»
15 years 2 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland
EUROMED
2010
15 years 1 months ago
Communication of Digital Cultural Heritage in Public Spaces by the Example of Roman Cologne
Abstract. The communication of cultural heritage in public spaces such as museums or exhibitions, gain more and more importance during the last years. The possibilities of interact...
Matthias Trapp, Amir Semmo, Rafael Pokorski, Claus...
TMC
2011
164views more  TMC 2011»
14 years 10 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
EJC
2010
14 years 10 months ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser
154
Voted
SCIENTOMETRICS
2010
142views more  SCIENTOMETRICS 2010»
14 years 10 months ago
Indicators for a webometric ranking of open access repositories
The Ranking web of World Repositories (http://repositories.webometrics.info) is introduced. The objective is to promote Open Access Initiatives supporting the use of repositories ...
Isidro F. Aguillo, José Luis Ortega Priego,...