Sciweavers

502 search results - page 31 / 101
» An Audit Logic for Accountability
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
ECAI
2004
Springer
14 years 1 months ago
Preferences for Queries in a Mediator Approach
The problem of integrating relevant information obtained from multiple heterogeneous sources is a complex task, with which biologists are now faced. In this paper, we address the p...
Alain Bidault, Sarah Cohen Boulakia, Christine Fro...
LPNMR
2009
Springer
14 years 2 months ago
A Default Approach to Semantics of Logic Programs with Constraint Atoms
We define the semantics of logic programs with (abstract) constraint atoms in a way closely tied to default logic. Like default logic, formulas in rules are evaluated using the cl...
Yi-Dong Shen, Jia-Huai You
DMDW
2003
134views Management» more  DMDW 2003»
13 years 9 months ago
Using Design Guidelines to Improve Data Warehouse Logical Design
Data Warehouse-(DW) logical design often start with a conceptual schema and then generates relational structures. Applying this approach implies to cope with two main aspects: (i) ...
Verónika Peralta, Raul Ruggia
ICCD
2006
IEEE
123views Hardware» more  ICCD 2006»
14 years 4 months ago
Steady and Transient State Analysis of Gate Leakage Current in Nanoscale CMOS Logic Gates
Abstract— Gate leakage (direct tunneling current for sub65nm CMOS) can severely affect both the transient and steady state behaviors of CMOS circuits. In this paper we quantify t...
Saraju P. Mohanty, Elias Kougianos