Sciweavers

6555 search results - page 913 / 1311
» Secure attribute-based systems
Sort
View
ICTAC
2005
Springer
15 years 10 months ago
A Rewriting Logic Sampler
Rewriting logic is a simple computational logic very well suited as a semantic framework within which many different models of computation, systems and languages can be naturally ...
José Meseguer
OOPSLA
2005
Springer
15 years 10 months ago
CodeQuest: querying source code with datalog
We describe CodeQuest, a system for querying source code. It combines two previous proposals, namely the use of logic programming and database system. Experiments (on projects ran...
Elnar Hajiyev, Mathieu Verbaere, Oege de Moor, Kri...
SIGOPSE
2004
ACM
15 years 10 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
126
Voted
ISI
2004
Springer
15 years 10 months ago
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
Abstract. Information technologies and infectious disease informatics are playing an increasingly important role in preventing, detecting, and managing infectious disease outbreaks...
Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Ca...
ISI
2004
Springer
15 years 10 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia