Sciweavers

460 search results - page 41 / 92
» On Role Logic
Sort
View
CSREASAM
2006
13 years 9 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
DLOG
2004
13 years 9 months ago
Specifying the Disjoint Nature of Object Properties in DL
This paper proposes constructs that can be used to declaratively specify the disjoint nature of object properties or roles. These constructs may be a useful extension to the Descr...
Cartik R. Kothari, David J. Russomanno
ICCAD
2007
IEEE
92views Hardware» more  ICCAD 2007»
14 years 4 months ago
Fault-tolerant multi-level logic decoder for nanoscale crossbar memory arrays
Several technologies with sub-lithographic features are targeting the fabrication of crossbar memories in which the nanowire decoder is playing a major role. In this paper, we sug...
M. Haykel Ben Jamaa, Kirsten E. Moselund, David At...
AMC
2006
125views more  AMC 2006»
13 years 7 months ago
A symbolic and algebraic computation based Lambda-Boolean reduction machine via PROLOG
This paper presents a new Lambda-Boolean reduction machine for Lambda-Boolean and Lambda-Beta Boolean reductions in the context of Lambda Calculus and introduces the role of Churc...
Seref Mirasyedioglu, Tolga Güyer
POS
1998
Springer
13 years 12 months ago
Persistent Java Objects in 3 Tier Architectures
The 3 tier architecture logically separates the functions of an application into a user interface component, a server business logic component, and a database component. Many appl...
Robert Bretl, Allen Otis, Marc San Soucie, Bruce S...