Sciweavers

1893 search results - page 177 / 379
» Computational composites
Sort
View
CCS
2009
ACM
16 years 6 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CICLING
2003
Springer
15 years 10 months ago
Total Lexicalism and GASGrammars: A Direct Way to Semantics
A new sort of generative grammar (Sec2) will be demonstrated which is more radically “lexicalist” than any earlier one (Sec1). It is a modified Unification Categorial Gramma...
Gábor Alberti, Katalin Balogh, Judit Kleibe...
ENTCS
2006
168views more  ENTCS 2006»
15 years 5 months ago
A Functional Programming Framework for Latency Insensitive Protocol Validation
Latency insensitive protocols (LIPs) have been proposed as a viable means to connect synchronous IP blocks via long interconnects in a system-on-chip. The reason why one needs to ...
Syed Suhaib, Deepak Mathaikutty, Sandeep K. Shukla...
ICTAC
2009
Springer
15 years 12 months ago
On the Expressiveness of Forwarding in Higher-Order Communication
Abstract. In higher-order process calculi the values exchanged in communications may contain processes. There are only two capabilities for received processes: execution and forwar...
Cinzia Di Giusto, Jorge A. Pérez, Gianluigi...
124
Voted
DEBS
2009
ACM
15 years 12 months ago
Event-based applications and enabling technologies
Event processing has become the paradigm of choice in many monitoring and reactive applications. However, the understanding of events, their composition and level of abstraction, ...
Annika Hinze, Kai Sachs, Alejandro P. Buchmann