Sciweavers

1928 search results - page 223 / 386
» Integrity Constraints in OWL
Sort
View
IH
2001
Springer
14 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
CODES
2000
IEEE
14 years 2 months ago
ASDEN: a comprehensive design framework vision for automotive electronic control systems
The automotive electronics industry is experiencing an era of unprecedented growth. Driven by emissions and safety legislation, fuel economy constraints, cost constraints, and cus...
Deborah Wilson, Daniel Dayton, R. Todd Hansell
CP
1998
Springer
14 years 2 months ago
Modelling CSP Solution Algorithms with Petri Decision Nets
The constraint paradigm provides powerful concepts to represent and solve different kinds of planning problems, e. g. factory scheduling. Factory scheduling is a demanding optimiz...
Stephan Pontow
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
14 years 2 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
SSD
1997
Springer
131views Database» more  SSD 1997»
14 years 2 months ago
Topological Error Correcting in GIS
It is agreed upon that topological relations ore of great importance regarding to GIS data sets consistency. A lot of errors that can be found in GIS data sets are coming from a l...
Thierry Ubeda, Max J. Egenhofer