Sciweavers

7661 search results - page 1380 / 1533
» Languages and the Computing Profession
Sort
View
CSFW
2010
IEEE
15 years 8 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
ICLP
2010
Springer
15 years 8 months ago
Tabling and Answer Subsumption for Reasoning on Logic Programs with Annotated Disjunctions
Probabilistic Logic Programming is an active field of research, with many proposals for languages, semantics and reasoning algorithms. One such proposal, Logic Programming with A...
Fabrizio Riguzzi, Terrance Swift
EUROSYS
2007
ACM
15 years 8 months ago
Automatic configuration of internet services
Recent research has found that operators frequently misconfigure Internet services, causing various availability and performance problems. In this paper, we propose a software inf...
Wei Zheng, Ricardo Bianchini, Thu D. Nguyen
ICLP
2007
Springer
15 years 8 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
AOSD
2006
ACM
15 years 8 months ago
Reflections on aspects and configurable protocols
The goals of aspect oriented software development (AOSD) and frameworks for configurable protocols (CPs) are similar in many respects. AOSD allows the specification of crosscuttin...
Matti A. Hiltunen, François Taïani, Ri...
« Prev « First page 1380 / 1533 Last » Next »