Sciweavers

87 search results - page 14 / 18
» Modeling System Security Rules with Time Constraints Using T...
Sort
View
COOPIS
2003
IEEE
14 years 24 days ago
Ontology Based Query Processing in Database Management Systems
The use of semantic knowledge in its various forms has become an important aspect in managing data in database and information systems. In the form of integrity constraints, it ha...
Chokri Ben Necib, Johann Christoph Freytag
PPSN
1994
Springer
13 years 11 months ago
Genetic L-System Programming
We present the Genetic L-System Programming (GLP) paradigm for evolutionary creation and development of parallel rewrite systems (Lsystems, Lindenmayer-systems) which provide a com...
Christian Jacob
AGENTS
1998
Springer
13 years 11 months ago
WebMate: A Personal Agent for Browsing and Searching
The World-Wide Web is developing very fast. Currently, nding useful information on the Web is a time consuming process. In this paper, we present WebMate, an agent that helps user...
Liren Chen, Katia P. Sycara
MMMACNS
2001
Springer
13 years 12 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
SCP
1998
163views more  SCP 1998»
13 years 7 months ago
Computing with Continuous Change
A central challenge in computer science and knowledge representation is the integration of conceptual frameworks for continuous and discrete change, as exemplified by the theory ...
Vineet Gupta, Radha Jagadeesan, Vijay A. Saraswat