Sciweavers

460 search results - page 41 / 92
» On Role Logic
Sort
View
115
Voted
CSREASAM
2006
15 years 1 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
DLOG
2004
15 years 1 months ago
Specifying the Disjoint Nature of Object Properties in DL
This paper proposes constructs that can be used to declaratively specify the disjoint nature of object properties or roles. These constructs may be a useful extension to the Descr...
Cartik R. Kothari, David J. Russomanno
107
Voted
ICCAD
2007
IEEE
92views Hardware» more  ICCAD 2007»
15 years 9 months ago
Fault-tolerant multi-level logic decoder for nanoscale crossbar memory arrays
Several technologies with sub-lithographic features are targeting the fabrication of crossbar memories in which the nanowire decoder is playing a major role. In this paper, we sug...
M. Haykel Ben Jamaa, Kirsten E. Moselund, David At...
112
Voted
AMC
2006
125views more  AMC 2006»
15 years 15 days ago
A symbolic and algebraic computation based Lambda-Boolean reduction machine via PROLOG
This paper presents a new Lambda-Boolean reduction machine for Lambda-Boolean and Lambda-Beta Boolean reductions in the context of Lambda Calculus and introduces the role of Churc...
Seref Mirasyedioglu, Tolga Güyer
117
Voted
POS
1998
Springer
15 years 4 months ago
Persistent Java Objects in 3 Tier Architectures
The 3 tier architecture logically separates the functions of an application into a user interface component, a server business logic component, and a database component. Many appl...
Robert Bretl, Allen Otis, Marc San Soucie, Bruce S...