Sciweavers

4401 search results - page 682 / 881
» Computing with Default Logic
Sort
View
155
Voted
ICCS
2009
Springer
15 years 11 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
MHCI
2009
Springer
15 years 11 months ago
Using semantic descriptions for adaptive mobile games UIs
Mobile devices became powerful recently and wireless Internet access is becoming standard. One important class of networked, mobile applications are location based games, making e...
Pascal Bihler, Holger Mügge, Mark Schmatz, Ar...
MIDDLEWARE
2009
Springer
15 years 11 months ago
Automatic Generation of Network Protocol Gateways
The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via ...
Yérom-David Bromberg, Laurent Réveil...
TLCA
2009
Springer
15 years 11 months ago
Algebraic Totality, towards Completeness
Finiteness spaces constitute a categorical model of Linear Logic whose objects can be seen as linearly topologised spaces, (a class of topological vector spaces introduced by Lefsc...
Christine Tasson
IPSN
2010
Springer
15 years 11 months ago
Covering space for in-network sensor data storage
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...
Rik Sarkar, Wei Zeng, Jie Gao, Xianfeng David Gu