Sciweavers

565 search results - page 21 / 113
» A logic for authorization provenance
Sort
View
ICPADS
2005
IEEE
14 years 1 months ago
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups
In this paper we propose an efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations...
Mark Manulis
SLOGICA
2008
97views more  SLOGICA 2008»
13 years 7 months ago
A Generic Framework for Adaptive Vague Logics
A generic format for adaptive vague logics is presented. The concrete adaptive vague logics based on this format are able to (1) identify sentences as vague or non-vague in the con...
Peter Verdée, Stephan van der Waart van Gul...
ALP
1994
Springer
13 years 11 months ago
Logic Programs as term Rewriting Systems
This paper studies the relationship between logic programs and term rewriting systems (TRSs). A compositional transform is de ned which given a logic program computes a TRS. For a...
Massimo Marchiori
SAC
1998
ACM
13 years 11 months ago
Object oriented process modeling with fuzzy logic
Fuzzy Logic has traditionally found an application in control theory, systems analysis, and artificial intelligence [9] [7]. However, it is very difficult to apply it to tradition...
Luigi Benedicenti, Giancarlo Succi, Tullio Vernazz...
ICSE
2009
IEEE-ACM
14 years 2 months ago
Can peer code reviews be exploited for later information needs?
Code reviews have proven to be an effective means of improving overall software quality. During the review, there is an exchange of knowledge between the code author and reviewer ...
Andrew Sutherland, Gina Venolia