Sciweavers

389 search results - page 61 / 78
» Service Composition Based on Natural Language Requests
Sort
View
IWFM
2000
167views Formal Methods» more  IWFM 2000»
15 years 3 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
SECURWARE
2007
IEEE
15 years 8 months ago
Distributed Identity Management Model for Digital Ecosystems
— Digital Ecosystems is the new paradigm for dynamic IT business integration. A Digital Ecosystem consists of institutions that compete, collaborate, and form stable or unstable ...
Hristo Koshutanski, Mihaela Ion, Luigi Telesca
INFOCOM
2002
IEEE
15 years 6 months ago
Optimal MAC State Switching for cdma2000 Networks
— This paper deals with the performance modeling of the various MAC states as defined by the cdma2000 protocol. Our method uses a composite performance metric which has the capa...
Mainak Chatterjee, Sajal K. Das
FOSSACS
2005
Springer
15 years 7 months ago
From Separation Logic to First-Order Logic
Separation logic is a spatial logic for reasoning locally about heap structures. A decidable fragment of its assertion language was presented in [1], based on a bounded model prope...
Cristiano Calcagno, Philippa Gardner, Matthew Hagu...
LREC
2010
219views Education» more  LREC 2010»
15 years 3 months ago
Approaches to Text Mining Arguments from Legal Cases
Abstract. This paper describes recent approaches using text-mining to automatically profile and extract arguments from legal cases. We outline some of the background context and mo...
Adam Wyner, Raquel Mochales Palau, Marie-Francine ...