Sciweavers

298 search results - page 40 / 60
» An Analysis of Exponentiation Based on Formal Languages
Sort
View
EDOC
2008
IEEE
14 years 2 months ago
Using Enterprise Architecture Models for System Quality Analysis
Enterprise Architecture is a model-based approach to business-oriented IT management. To promote good IT decision making, an Enterprise Architecture framework needs to explicate w...
Per Närman, Marten Schönherr, Pontus Joh...
POPL
2008
ACM
14 years 8 months ago
The design and implementation of typed scheme
When scripts in untyped languages grow into large programs, maintaining them becomes difficult. A lack of types in typical scripting languages means that programmers must (re)disc...
Sam Tobin-Hochstadt, Matthias Felleisen
ICDT
1995
ACM
101views Database» more  ICDT 1995»
13 years 11 months ago
Approximation in Databases
Partial information in databases can arise when information from several databases is combined. Even if each database is complete for some \world", the combined databases wil...
Leonid Libkin
CSFW
2012
IEEE
11 years 10 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
ICFCA
2005
Springer
14 years 1 months ago
Conceptual Exploration of Semantic Mirrors
Abstract. The “Semantic Mirrors Method” (Dyvik, 1998) is a means for automatic derivation of thesaurus entries from a word-aligned parallel corpus. The method is based on the c...
Uta Priss, L. John Old