Sciweavers

2061 search results - page 86 / 413
» Authorization for Metacomputing Applications
Sort
View
CPC
2007
113views more  CPC 2007»
15 years 4 months ago
Regular Partitions of Hypergraphs: Regularity Lemmas
Abstract. Szemer´edi’s regularity lemma for graphs has proved to be a powerful tool with many subsequent applications. The objective of this paper is to extend the techniques de...
Vojtech Rödl, Mathias Schacht
VL
2010
IEEE
201views Visual Languages» more  VL 2010»
15 years 2 months ago
Democratizing Computational Tools for Interaction Designers
I am creating a new programming language and editor that is aimed towards authoring interactive behaviors. This language is intended to allow more interaction designers to write t...
Stephen Oney
CSFW
2008
IEEE
15 years 10 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
PLDI
2006
ACM
15 years 10 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka
ICDM
2005
IEEE
129views Data Mining» more  ICDM 2005»
15 years 9 months ago
Mining Chains of Relations
Traditional data mining applications consider the problem of mining a single relation between two attributes. For example, in a scientific bibliography database, authors are rela...
Foto N. Afrati, Gautam Das, Aristides Gionis, Heik...