Sciweavers

5252 search results - page 45 / 1051
» Logic in Access Control
Sort
View
DKE
2002
118views more  DKE 2002»
13 years 10 months ago
Consistent policy enforcement in distributed systems using mobile policies
This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges ...
Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amg...
EUROPAR
2004
Springer
14 years 4 months ago
Concurrent Table Accesses in Parallel Tabled Logic Programs
Tabling is an implementation technique that improves the declarativeness and expressiveness of Prolog by reusing answers to subgoals. The declarative nature of tabled logic program...
Ricardo Rocha, Fernando M. A. Silva, Vítor ...
FPL
2001
Springer
136views Hardware» more  FPL 2001»
14 years 3 months ago
Building Asynchronous Circuits with JBits
Asynchronous logic design has been around for decades. However, only recently has it gained any commercial success. Research has focused on a wide variety of uses, from microproces...
Eric Keller
ENTCS
2007
199views more  ENTCS 2007»
13 years 10 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
ISCAS
2005
IEEE
99views Hardware» more  ISCAS 2005»
14 years 4 months ago
Concentrator access networks for programmable logic cores on SoCs
- The inclusion of programmable logic cores in modern SoCs motivates the need for an access network to make full use of this resource. The programmable nature of these cores remove...
Bradley R. Quinton, Steven J. E. Wilton