Sciweavers

5344 search results - page 204 / 1069
» Privacy-Preserving Set Operations
Sort
View
155
Voted
DEON
2010
Springer
15 years 8 months ago
Relevance, Derogation and Permission
Abstract. We show that a recently developed theory of positive permission based on the notion of derogation is hampered by a triviality result that indicates a problem with the und...
Audun Stolpe
148
Voted
FORMATS
2006
Springer
15 years 7 months ago
Model Checking Timed Automata with Priorities Using DBM Subtraction
In this paper we describe an extension of timed automata with priorities, and efficient algorithms to compute subtraction on DBMs (difference bounded matrices), needed in symbolic ...
Alexandre David, John Håkansson, Kim Guldstr...
127
Voted
DOOD
1995
Springer
102views Database» more  DOOD 1995»
15 years 7 months ago
Active Database Rules with Transaction-Conscious Stable-Model Semantics
Semantics represents a major problem area for active databases inasmuch as (i) there is l framework for defining the abstract semantics of active rules, and (ii) the various syst...
Carlo Zaniolo
133
Voted
BPM
2008
Springer
142views Business» more  BPM 2008»
15 years 5 months ago
Towards Process Models for Disaster Response
In the immediate aftermath of a disaster routine processes, even if specifically designed for such a situation, are not enacted blindly. Actions and processes rather adapt their be...
Dirk Fahland, Heiko Woith
116
Voted
ADBIS
2010
Springer
145views Database» more  ADBIS 2010»
15 years 5 months ago
On Support of Ordering in Multidimensional Data Structures
Multidimensional data structures are applied in many areas, e.g. in data mining, indexing multimedia data and text documents, and so on. There are some applications where the range...
Filip Krizka, Michal Krátký, Radim B...