Sciweavers

2061 search results - page 86 / 413
» Authorization for Metacomputing Applications
Sort
View
112
Voted
CPC
2007
113views more  CPC 2007»
15 years 17 days ago
Regular Partitions of Hypergraphs: Regularity Lemmas
Abstract. Szemer´edi’s regularity lemma for graphs has proved to be a powerful tool with many subsequent applications. The objective of this paper is to extend the techniques de...
Vojtech Rödl, Mathias Schacht
142
Voted
VL
2010
IEEE
201views Visual Languages» more  VL 2010»
14 years 11 months ago
Democratizing Computational Tools for Interaction Designers
I am creating a new programming language and editor that is aimed towards authoring interactive behaviors. This language is intended to allow more interaction designers to write t...
Stephen Oney
94
Voted
CSFW
2008
IEEE
15 years 7 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
123
Voted
PLDI
2006
ACM
15 years 6 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka
92
Voted
ICDM
2005
IEEE
129views Data Mining» more  ICDM 2005»
15 years 6 months ago
Mining Chains of Relations
Traditional data mining applications consider the problem of mining a single relation between two attributes. For example, in a scientific bibliography database, authors are rela...
Foto N. Afrati, Gautam Das, Aristides Gionis, Heik...