Sciweavers

4418 search results - page 174 / 884
» A Formal Approach to Computer Systems Requirements Documenta...
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 5 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
ECAI
2006
Springer
15 years 8 months ago
CTL Model Update: Semantics, Computations and Implementation
Minimal change is a fundamental principle for modeling system dynamics. In this paper, we study the issue of minimal change for Computational Tree Logic (CTL) model update. We firs...
Yulin Ding, Yan Zhang
LWA
2008
15 years 6 months ago
Rule-Based Information Extraction for Structured Data Acquisition using TextMarker
Information extraction is concerned with the location of specific items in (unstructured) textual documents, e.g., being applied for the acquisition of structured data. Then, the ...
Martin Atzmüller, Peter Klügl, Frank Pup...
CMSB
2009
Springer
15 years 11 months ago
A Bayesian Approach to Model Checking Biological Systems
Recently, there has been considerable interest in the use of Model Checking for Systems Biology. Unfortunately, the state space of stochastic biological models is often too large f...
Sumit Kumar Jha, Edmund M. Clarke, Christopher Jam...
CLUSTER
2004
IEEE
15 years 4 months ago
Seamless Access to Decentralized Storage Services in Computational Grids via a Virtual File System
This paper describes a novel technique for establishing a virtual file system that allows data to be transferred user-transparently and on-demand across computing and storage serve...
Renato J. O. Figueiredo, Nirav H. Kapadia, Jos&eac...