Sciweavers

165 search results - page 22 / 33
» Discussions on Interpretability of Fuzzy Systems using Simpl...
Sort
View
ICCS
2009
Springer
14 years 1 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
CONTEXT
1999
Springer
13 years 11 months ago
Contexts, Domains, and Software
We survey some issues that relate to context dependence and context sensitivity in the development of software, particularly in relation to information systems by defining a range...
Alfs T. Berztiss
LPKR
1997
Springer
13 years 11 months ago
Reasoning with Prioritized Defaults
The purpose of this paper is to investigate the methodology of reasoning with prioritized defaults in the language of logic programs under the answer set semantics. We present a do...
Michael Gelfond, Tran Cao Son
ECBS
2006
IEEE
122views Hardware» more  ECBS 2006»
14 years 1 months ago
Customer-oriented Development of Complex Distributed Systems
Complex and distributed systems are more and more common. Hardware is going from strength to strength and is embedded in high performance peer-to-peer networks mostly. The task of...
Ivonne Erfurth
ECHT
1994
13 years 11 months ago
An Interaction Engine for Rich Hypertexts
In semantically rich hypertexts it is attractive to enable presentation of a network of nodes and links at different levels action. It is also important that the user can interact...
Kasper Østerbye, Kurt Nørmark