Sciweavers

1486 search results - page 263 / 298
» Firewall Rules Analysis
Sort
View
ENTCS
2007
105views more  ENTCS 2007»
14 years 11 months ago
Narrowing and Rewriting Logic: from Foundations to Applications
Narrowing was originally introduced to solve equational E-unification problems. It has also been recognized as a key mechanism to unify functional and logic programming. In both ...
Santiago Escobar, José Meseguer, Prasanna T...
RE
2006
Springer
14 years 11 months ago
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
In the United States, federal and state regulations prescribe stakeholder rights and obligations that must be satisfied by the requirements for software systems. These regulations ...
Travis D. Breaux, Matthew W. Vail, Annie I. Ant&oa...
CANDC
2005
ACM
14 years 11 months ago
Assessment of chemical libraries for their druggability
High throughput virtual screening is acknowledged as the initial means for identifying hit compounds that will be eventually transformed to leads or drug candidates. To improve qu...
Suzanne W. Sirois, George Hatzakis, Dongqing Wei, ...
CN
2004
102views more  CN 2004»
14 years 11 months ago
Comparing economic incentives in peer-to-peer networks
Users who join a peer-to-peer network have, in general, suboptimal incentives to contribute to the network, because of the externalities that exist between them. The result is an ...
Panayotis Antoniadis, Costas Courcoubetis, Robin M...
AI
2000
Springer
14 years 11 months ago
Alternative foundations for Reiter's default logic
We introduce an alternative conceptual basis for default reasoning in Reiter's default logic. In fact, most formal or computational treatments of default logic suffer from th...
Thomas Linke, Torsten Schaub