Sciweavers

433 search results - page 27 / 87
» Using Description Logics in Relation Based Access Control
Sort
View
ICLP
2007
Springer
15 years 1 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
MUC
1992
15 years 1 months ago
GE NLToolset: description of the system as used for MUC-4
The GE NLTooLsET is a set of text interpretation tools designed to be easily adapted to new domains. This report summarizes the system and its performance on the MUG-4 task . INTR...
George B. Krupka, Paul S. Jacobs, Lisa F. Rau, Loi...
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
15 years 10 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
MMB
2001
Springer
141views Communications» more  MMB 2001»
15 years 2 months ago
Performance Analysis of the Random Access Protocol in TETRAPOL Trunked Radio Networks
This paper provides a performance evaluation of the TETRAPOL random access protocol. The results are based on a Markovian model which is also presented. The Markovian model is use...
Dirk Kuypers, Peter Sievering
CORR
2004
Springer
119views Education» more  CORR 2004»
14 years 9 months ago
On Role Logic
We present role logic, a notation for describing properties of relational structures in shape analysis, databases, and knowledge bases. We construct role logic using the ideas of ...
Viktor Kuncak, Martin C. Rinard