Sciweavers

7715 search results - page 1303 / 1543
» Visual Rules Modeling
Sort
View
IFIP
2004
Springer
15 years 9 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
147
Voted
KR
2004
Springer
15 years 8 months ago
A Causal Logic of Logic Programming
The causal logic from (Bochman 2003b) is shown to provide a natural logical basis for logic programming. More exactly, it is argued that any logic program can be seen as a causal ...
Alexander Bochman
135
Voted
SGAI
2004
Springer
15 years 8 months ago
Implementing Policy Management through BDI
The requirement for Grid middleware to be largely transparent to individual users and at the same time act in accordance with their personal needs is a difficult challenge. In e-...
Simon Miles, Juri Papay, Michael Luck, Luc Moreau
COOPIS
2003
IEEE
15 years 8 months ago
Ontology Based Query Processing in Database Management Systems
The use of semantic knowledge in its various forms has become an important aspect in managing data in database and information systems. In the form of integrity constraints, it ha...
Chokri Ben Necib, Johann Christoph Freytag
126
Voted
SMI
2003
IEEE
138views Image Analysis» more  SMI 2003»
15 years 8 months ago
Higher Order Prediction for Geometry Compression
A lot of techniques have been developed for the encoding of triangular meshes as this is a widely used representation for the description of surface models. Although methods for t...
Stefan Gumhold, Rachida Amjoun
« Prev « First page 1303 / 1543 Last » Next »