Sciweavers

565 search results - page 11 / 113
» A logic for authorization provenance
Sort
View
ICIP
2004
IEEE
14 years 9 months ago
Cell nuclei segmentation using fuzzy logic engine
The task of segmenting cell nuclei in microscope images is a classical image analysis problem. The accurate nuclei segmentation may contribute to development of successful system ...
Grigory Begelman, Eran Gur, Ehud Rivlin, Michael R...
AAAI
2004
13 years 9 months ago
Model Checking Temporal Logics of Knowledge in Distributed Systems
Model checking is a promising approach to automatic verification, which has concentrated on specification expressed in temporal logic. Comparatively little attention has been give...
Kaile Su
LCC
1994
248views Algorithms» more  LCC 1994»
13 years 11 months ago
Comparing the Power of Monadic NP Games
The descriptive complexity of a problem is the complexity of describing the problem in some logical formalism. One of the few techniques for proving separation results in descripti...
Ronald Fagin
CSFW
2010
IEEE
13 years 11 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
FMCAD
2004
Springer
13 years 11 months ago
A Functional Approach to the Formal Specification of Networks on Chip
We present a functional approach, based on the ACL2 logic, for the specification of system on a chip communication architectures. Our decomposition of the communications allows the...
Julien Schmaltz, Dominique Borrione