Sciweavers

1297 search results - page 146 / 260
» Control of systems integrating logic, dynamics, and constrai...
Sort
View
SCCC
2005
IEEE
15 years 7 months ago
Optimizing repair programs for consistent query answering
Databases may not satisfy integrity constraints (ICs) for several reasons. Nevertheless, in most of the cases an important part of the data is still consistent wrt certain desired...
Mónica Caniupán Marileo, Leopoldo E....
AAAI
1998
15 years 2 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...
CONEXT
2009
ACM
15 years 2 months ago
PACMAN: a platform for automated and controlled network operations and configuration management
The lack of automation associated with network operations in general and network configuration management in particular, is widely recognized as a significant contributing factor ...
Xu Chen, Zhuoqing Morley Mao, Jacobus E. van der M...
CCS
2007
ACM
15 years 7 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
AAAI
1990
15 years 2 months ago
Exploiting Locality in a TMS
This paper presents a new approach for exploiting Truth Maintenance Systems(TMSs) which makes them simpler to use without necessarily incurring a substantial performance penalty. ...
Johan de Kleer