Sciweavers

565 search results - page 34 / 113
» A logic for authorization provenance
Sort
View
IJMSO
2006
105views more  IJMSO 2006»
13 years 7 months ago
Trust network-based filtering of aggregated claims
: On the semantic web, assertions may be aggregated from many sources, those aggregations filtered, reasoned over, aggregated with other aggregators, displayed, scraped, extracted,...
Jennifer Golbeck, Bijan Parsia
ITC
2002
IEEE
81views Hardware» more  ITC 2002»
14 years 14 days ago
Design Rewiring Using ATPG
—Logic optimization is the step of the very large scale integration (VLSI) design cycle where the designer performs modifications on a design to satisfy different constraints suc...
Andreas G. Veneris, Magdy S. Abadir, Mandana Amiri
TKDE
2010
161views more  TKDE 2010»
13 years 2 months ago
A Deductive Spreadsheet System for End Users
We exploit the spreadsheet metaphor to make deductive problem-solving methods available to the vast population of spreadsheet end users. In particular, we show how the function-bas...
Marcelo Tallis, Robert M. Balzer
AO
2007
144views more  AO 2007»
13 years 7 months ago
Social acquisition of ontologies from communication processes
This work introduces a formal framework for the social acquisition of ontologies which are constructed dynamically from overhearing the possibly conflicting symbolic interaction o...
Matthias Nickles
SP
2000
IEEE
13 years 12 months ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum