Sciweavers

1928 search results - page 340 / 386
» Integrity Constraints in OWL
Sort
View
WWW
2001
ACM
14 years 10 months ago
Towards second and third generation web-based multimedia
First generation Web-content encodes information in handwritten (HTML) Web pages. Second generation Web content generates HTML pages on demand, e.g. by filling in templates with c...
Jacco van Ossenbruggen, Joost Geurts, Frank Cornel...
ICFP
2003
ACM
14 years 10 months ago
A user-centred approach to functions in Excel
We describe extensions to the Excel spreadsheet that integrate userdefined functions into the spreadsheet grid, rather than treating them as a "bolt-on". Our first objec...
Simon L. Peyton Jones, Alan F. Blackwell, Margaret...
SEMWEB
2009
Springer
14 years 4 months ago
Semantically Enabled Temporal Reasoning in a Virtual Observatory
The Virtual Solar-Terrestrial Observatory (VSTO) is a distributed, scalable education and research environment for searching, integrating, and analyzing observational, experimental...
Patrick West, Eric Rozell, Stephan Zednik, Peter F...
SACMAT
2009
ACM
14 years 4 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
CODES
2007
IEEE
14 years 4 months ago
ESL design and HW/SW co-verification of high-end software defined radio platforms
Multiple wireless technologies are converging to run on personal handhelds. The plethora of communication standards next to the cost issues of deeper submicron processing require ...
A. C. H. Ng, J. W. Weijers, Miguel Glassee, Thomas...