Sciweavers

565 search results - page 48 / 113
» A logic for authorization provenance
Sort
View
BIRTHDAY
2005
Springer
14 years 2 months ago
SAT-Based Decision Procedures for Automated Reasoning: A Unifying Perspective
Propositional reasoning (SAT) is an essential part of many reasoning tasks. Many problems in computer science can be compiled to SAT and then effectively decided using state-of-th...
Alessandro Armando, Claudio Castellini, Enrico Giu...
KES
2004
Springer
14 years 2 months ago
Representing Knowledge in Controlled Natural Language: A Case Study
In this case study I argue for the usage of a machine-oriented controlled natural language as interface language to knowledge systems. Instead of using formal languages that are di...
Rolf Schwitter
HT
2000
ACM
14 years 1 months ago
Arguments in hypertext: a rhetorical approach
The qualities of non-sequentiality that make hypertext so appealing to writers and readers of informative and literary texts are also those that problematize arguments in the same...
Locke M. Carter
ACSAC
1999
IEEE
14 years 1 months ago
Security Architecture Development and Results for a Distributed Modeling and Simulation System
This paper reports on an ongoing effort to define the security architecture for the Joint Simulation System (JSIMS), a joint military modeling and simulation system. It also descr...
Richard B. Neely
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 9 months ago
A view of canonical extension
Abstract. This is a short survey illustrating some of the essential aspects of the theory of canonical extensions. In addition some topological results about canonical extensions o...
Mai Gehrke, Jacob Vosmaer