Sciweavers

1893 search results - page 177 / 379
» Computational composites
Sort
View
101
Voted
CCS
2009
ACM
16 years 1 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CICLING
2003
Springer
15 years 6 months ago
Total Lexicalism and GASGrammars: A Direct Way to Semantics
A new sort of generative grammar (Sec2) will be demonstrated which is more radically “lexicalist” than any earlier one (Sec1). It is a modified Unification Categorial Gramma...
Gábor Alberti, Katalin Balogh, Judit Kleibe...
110
Voted
ENTCS
2006
168views more  ENTCS 2006»
15 years 23 days ago
A Functional Programming Framework for Latency Insensitive Protocol Validation
Latency insensitive protocols (LIPs) have been proposed as a viable means to connect synchronous IP blocks via long interconnects in a system-on-chip. The reason why one needs to ...
Syed Suhaib, Deepak Mathaikutty, Sandeep K. Shukla...
87
Voted
ICTAC
2009
Springer
15 years 7 months ago
On the Expressiveness of Forwarding in Higher-Order Communication
Abstract. In higher-order process calculi the values exchanged in communications may contain processes. There are only two capabilities for received processes: execution and forwar...
Cinzia Di Giusto, Jorge A. Pérez, Gianluigi...
76
Voted
DEBS
2009
ACM
15 years 7 months ago
Event-based applications and enabling technologies
Event processing has become the paradigm of choice in many monitoring and reactive applications. However, the understanding of events, their composition and level of abstraction, ...
Annika Hinze, Kai Sachs, Alejandro P. Buchmann