Sciweavers

9145 search results - page 1603 / 1829
» Description Logic Systems
Sort
View
146
Voted
IJCSA
2006
95views more  IJCSA 2006»
15 years 3 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
ENTCS
2007
103views more  ENTCS 2007»
15 years 3 months ago
Policy-based Coordination in PAGODA: A Case Study
PAGODA (Policy And GOal Based Distributed Autonomy) is a modular architecture for specifying and prototyping autonomous systems. A PAGODA node (agent) interacts with its environme...
Carolyn L. Talcott
116
Voted
PAMI
2006
95views more  PAMI 2006»
15 years 3 months ago
Table Detection in Online Ink Notes
In documents, tables are important structured objects that present statistical and relational information. In this paper, we present a robust system which is capable of detecting t...
Zhouchen Lin, Junfeng He, Zhicheng Zhong, Rongrong...
TKDE
2008
177views more  TKDE 2008»
15 years 3 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
TPDS
2008
88views more  TPDS 2008»
15 years 3 months ago
A Two-Hop Solution to Solving Topology Mismatch
The efficiency of Peer-to-Peer (P2P) systems is largely dependent on the overlay constructions. Due to the random selection of logical neighbors, there often exists serious topolog...
Yunhao Liu
« Prev « First page 1603 / 1829 Last » Next »