Sciweavers

565 search results - page 10 / 113
» A logic for authorization provenance
Sort
View
LFCS
2009
Springer
14 years 2 months ago
Hypersequent Systems for the Admissible Rules of Modal and Intermediate Logics
The admissible rules of a logic are those rules under which the set of theorems of the logic is closed. In a previous paper by the authors, formal systems for deriving the admissib...
Rosalie Iemhoff, George Metcalfe
SACMAT
2009
ACM
14 years 2 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
ISMVL
2008
IEEE
134views Hardware» more  ISMVL 2008»
14 years 1 months ago
Multiple-Valued Logic Memory System Design Using Nanoscale Electrochemical Cells
Nanoscale multiple-valued logic systems require the development of nanometer scale integrated circuits and components. Due to limits in device physics, new components must be deve...
Theodore W. Manikas, Dale Teeters
AML
2002
131views more  AML 2002»
13 years 7 months ago
Fuzzy logic, continuity and effectiveness
Abstract. It is shown the complete equivalence between the theory of continuous (enumeration) fuzzy closure operators and the theory of (effective) fuzzy deduction systems in Hilbe...
Loredana Biacino, Giangiacomo Gerla
WWW
2003
ACM
14 years 8 months ago
Haystack: A Platform for Authoring End User Semantic Web Applications
The Semantic Web promises to open innumerable opportunities for automation and information retrieval by standardizing the protocols for metadata exchange. However, just as the succ...
Dennis Quan, David Huynh, David R. Karger