Sciweavers

3595 search results - page 34 / 719
» Roles of Program Extension
Sort
View
EATCS
2000
85views more  EATCS 2000»
13 years 7 months ago
A New Zero-One Law and Strong Extension Axioms
One of the previous articles in this column was devoted to the zero-one laws for a number of logics playing prominent role in finite model theory: first-order logic FO, the extens...
Andreas Blass, Yuri Gurevich
ICC
2007
IEEE
103views Communications» more  ICC 2007»
14 years 2 months ago
On the Relay-Based Coverage Extension for Non-Conventional Multi-Hop Wireless Networks
Abstract— Due to the rapid growth of personal communications, it is now believed that multi-hop topologies will certainly play a key role in forthcoming wireless communications s...
Ramón Agüero, Johnny Choque, Luis Mu&n...
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
14 years 1 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...
AAI
2006
215views more  AAI 2006»
13 years 7 months ago
Extensive Evaluation of Efficient NLP-Driven Text Classification
Extensive experimental evidence is required to study the impact of text categorization approaches on real data and to assess the performance within operational scenarios. In this ...
Roberto Basili, Alessandro Moschitti, Maria Teresa...
ECOOP
2009
Springer
14 years 8 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...