Sciweavers

565 search results - page 35 / 113
» A logic for authorization provenance
Sort
View
DLOG
2003
13 years 9 months ago
Status Report on Description Logics related Project in Korea
In this short position paper, the project of building intelligent business information infrastructure using semantic web, ontology, description logics, and other related knowledge...
Shinyoung Lim
ICCAD
1998
IEEE
153views Hardware» more  ICCAD 1998»
13 years 11 months ago
Intellectual property protection by watermarking combinational logic synthesis solutions
The intellectual property (IP) business model is vulnerable to a number of potentially devastating obstructions, such as misappropriation and intellectual property fraud. We propo...
Darko Kirovski, Yean-Yow Hwang, Miodrag Potkonjak,...
CADE
1998
Springer
13 years 11 months ago
Rank/Activity: A Canonical Form for Binary Resolution
Abstract. The rank/activity restriction on binary resolution is introduced. It accepts only a single derivation tree from a large equivalence class of such trees. The equivalence c...
Joseph Douglas Horton, Bruce Spencer
DLOG
2008
13 years 10 months ago
Identifying Objects Over Time with Description Logics
A fundamental requirement for cooperating agents is to agree on a selection of component values of objects that can be used for reliably communicating references to the objects, to...
David Toman, Grant E. Weddell
AAAI
1994
13 years 9 months ago
Reasoning about Priorities in Default Logic
In this paper we argue that for realistic applications involving default reasoning it is necessary to reason about the priorities of defaults. Existing approaches require the know...
Gerhard Brewka