Sciweavers

960 search results - page 142 / 192
» Computational Semantics Of Mass Terms
Sort
View
IWAN
2000
Springer
13 years 11 months ago
Active Concealment for Internet Speech Transmission
Recently, active networks have been highlighted as a key enabling technology to obtain immense flexibility in terms of network deployment, configurability, and packet processing. E...
Long Le, Henning Sanneck, Georg Carle, Tohru Hoshi
COMGEO
2010
ACM
13 years 11 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann
ASM
2008
ASM
13 years 9 months ago
Modeling Workflows, Interaction Patterns, Web Services and Business Processes: The ASM-Based Approach
Abstract. We survey the use of the Abstract State Machines (ASM) method for a rigorous foundation of modeling and validating web services, workflows, interaction patterns and busin...
Egon Börger, Bernhard Thalheim
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
COLING
1992
13 years 9 months ago
A Logic Programming View of Relational Morphology
he more abstract term "relational morphology" in place of tile usual "two-level morphology" in order to emphasize an aspect of Koskenniemi's work which ha...
Harvey Abramson