Sciweavers

1588 search results - page 297 / 318
» On the Logic of Constitutive Rules
Sort
View
JODS
2008
424views Data Mining» more  JODS 2008»
15 years 1 months ago
Semantically Processing Parallel Colour Descriptions
Information integration and retrieval are useful tasks in many information systems. In these systems, it is far from an easy task to directly integrate information from natural lan...
Shenghui Wang, Jeff Z. Pan
TKDE
2008
177views more  TKDE 2008»
15 years 1 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 1 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
CORR
2002
Springer
106views Education» more  CORR 2002»
15 years 1 months ago
Domain-Dependent Knowledge in Answer Set Planning
In this paper we consider three di erent kinds of domain dependent control knowledge (temporal, procedural and HTN-based) that are useful in planning. Our approach is declarative ...
Tran Cao Son, Chitta Baral, Tran Hoai Nam, Sheila ...
DEDS
1998
152views more  DEDS 1998»
15 years 29 days ago
Timed Petri Nets in Hybrid Systems: Stability and Supervisory Control
In this paper, timed Petri nets are used to model and control hybrid systems. Petri nets are used instead of finite automata primarily because of the advantages they offer in de...
Xenofon D. Koutsoukos, Kevin X. He, Michael D. Lem...