Sciweavers

1113 search results - page 128 / 223
» Counter Systems for Data Logics
Sort
View
EDBT
2002
ACM
112views Database» more  EDBT 2002»
16 years 4 months ago
Querying with Intrinsic Preferences
The handling of user preferences is becoming an increasingly important issue in present-day information systems. Among others, preferences are used for information filtering and ex...
Jan Chomicki
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 11 months ago
A high-level debug environment for communication-centric debug
—A large part of a modern SOC’s debug complexity resides in the interaction between the main system components. ion-level debug moves the abstraction level of the debug process...
Kees Goossens, Bart Vermeulen, Ashkan Beyranvand N...
CIE
2007
Springer
15 years 11 months ago
RZ: A Tool for Bringing Constructive and Computable Mathematics Closer to Programming Practice
Realizability theory is not just a fundamental tool in logic and computability. It also has direct application to the design and implementation of programs, since it can produce co...
Andrej Bauer, Christopher A. Stone
ACSAC
2001
IEEE
15 years 8 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
ICPR
2008
IEEE
15 years 11 months ago
A cryptosystem based on palmprint feature
Biometric cryptography is a technique using biometric features to encrypt data, which can improve the security of the encrypted data and overcome the shortcomings of the tradition...
Xiangqian Wu, Kuanquan Wang, David Zhang