Sciweavers

1121 search results - page 76 / 225
» Logics of Complementarity in Information Systems
Sort
View
JIFS
2002
134views more  JIFS 2002»
13 years 8 months ago
Classification of gene expression data using fuzzy logic
Microarray technologies have allowed the measurement of expression of multiple genes simultaneously. Gene expression levels can be used to classify tissues into diagnostic or progn...
Lucila Ohno-Machado, Staal A. Vinterbo, Griffin We...
LOPSTR
2005
Springer
14 years 2 months ago
Non-leftmost Unfolding in Partial Evaluation of Logic Programs with Impure Predicates
Partial evaluation of logic programs which contain impure predicates poses non-trivial challenges. Impure predicates include those which produce side-effects, raise errors (or exc...
Elvira Albert, Germán Puebla, John P. Galla...
EDBT
2008
ACM
137views Database» more  EDBT 2008»
14 years 9 months ago
Synthesizing structured text from logical database subsets
In the classical database world, information access has been based on a paradigm that involves structured, schema-aware, queries and tabular answers. In the current environment, h...
Alkis Simitsis, Georgia Koutrika, Yannis Alexandra...
LISP
2008
97views more  LISP 2008»
13 years 9 months ago
Efficient and flexible access control via Jones-optimal logic program specialisation
We describe the use of a flexible meta-interpreter for performing access control checks on deductive databases. The meta-program is implemented in Prolog and takes as input a datab...
Steve Barker, Michael Leuschel, Mauricio Varea
SIGADA
2004
Springer
14 years 2 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton