Sciweavers

5252 search results - page 29 / 1051
» Logic in Access Control
Sort
View
ICLP
2007
Springer
14 years 2 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
EJWCN
2010
118views more  EJWCN 2010»
13 years 5 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
ASIAN
2005
Springer
150views Algorithms» more  ASIAN 2005»
14 years 4 months ago
ACB-R: An Adaptive Clustering-Based Data Replication Algorithm on a P2P Data-Store
Replication on geographically distributed, unreliable, P2P interconnecting nodes can offer high data availability and low network latency for replica access. The challenge is how ...
Junhu Zhang, Dongqing Yang, Shiwei Tang
CORR
2010
Springer
74views Education» more  CORR 2010»
13 years 10 months ago
RAFDA: Middleware Supporting the Separation of Application Logic from Distribution Policy
Middleware technologies, often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system...
Alan Dearle, Scott M. Walker, Stuart J. Norcross, ...
FSKD
2006
Springer
121views Fuzzy Logic» more  FSKD 2006»
14 years 2 months ago
PWM Fuzzy Controller for Nonlinear Systems
Young Hoon Joo, Sung Ho Kim, Kwang-Baek Kim