Sciweavers

1428 search results - page 41 / 286
» aim 2010
Sort
View
ENTCS
2007
121views more  ENTCS 2007»
14 years 10 months ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle
ENTCS
2007
112views more  ENTCS 2007»
14 years 10 months ago
A Calculus of Global Interaction based on Session Types
This paper proposes a calculus for describing communication-centred programs and discusses its use through a formal description of several use cases from real business protocols. ...
Marco Carbone, Kohei Honda, Nobuko Yoshida
ENTCS
2007
101views more  ENTCS 2007»
14 years 10 months ago
Solving Sudoku Puzzles with Rewriting Rules
The aim of the sudoku puzzle (also known as number place in the United States) is to enter a numeral from 1 through 9 in each cell of a grid, most frequently a 9 × 9 grid made up...
Gustavo Santos-García, Miguel Palomino
ENTCS
2007
107views more  ENTCS 2007»
14 years 10 months ago
Applications = Components + GLoo
We are advocating a component-oriented software development approach that provides support for a clear separation between the computational and the compositional entities of an ap...
Markus Lumpe
75
Voted
ENTCS
2007
85views more  ENTCS 2007»
14 years 10 months ago
Stochastic Modelling of Communication Protocols from Source Code
A major development in qualitative model checking was the jump to verifying properties of source code directly, rather than requiring a separately specified model. We describe an...
Michael J. A. Smith