Sciweavers

4401 search results - page 795 / 881
» Computing with Default Logic
Sort
View
DKE
2007
131views more  DKE 2007»
13 years 8 months ago
Reasoning and change management in modular ontologies
ct 9 The benefits of modular representations are well known from many areas of computer science. While in software engi10 neering modularization is mainly a vehicle for supporting...
Heiner Stuckenschmidt, Michel C. A. Klein
JUCS
2008
138views more  JUCS 2008»
13 years 8 months ago
Schema Mappings and Agents' Actions in P2P Data Integration System
: We propose specification of schema mappings and agents' actions in XML data integration task. We discuss the problem in a highly-dynamic environment consisting of a communit...
Grazyna Brzykcy, Jerzy Bartoszek, Tadeusz Pankowsk...
ML
2008
ACM
13 years 8 months ago
Margin-based first-order rule learning
Abstract We present a new margin-based approach to first-order rule learning. The approach addresses many of the prominent challenges in first-order rule learning, such as the comp...
Ulrich Rückert, Stefan Kramer
TDSC
2008
152views more  TDSC 2008»
13 years 8 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
TKDE
2008
177views more  TKDE 2008»
13 years 8 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...