Sciweavers

389 search results - page 61 / 78
» Service Composition Based on Natural Language Requests
Sort
View
IWFM
2000
167views Formal Methods» more  IWFM 2000»
13 years 9 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
SECURWARE
2007
IEEE
14 years 1 months ago
Distributed Identity Management Model for Digital Ecosystems
— Digital Ecosystems is the new paradigm for dynamic IT business integration. A Digital Ecosystem consists of institutions that compete, collaborate, and form stable or unstable ...
Hristo Koshutanski, Mihaela Ion, Luigi Telesca
INFOCOM
2002
IEEE
14 years 18 days ago
Optimal MAC State Switching for cdma2000 Networks
— This paper deals with the performance modeling of the various MAC states as defined by the cdma2000 protocol. Our method uses a composite performance metric which has the capa...
Mainak Chatterjee, Sajal K. Das
FOSSACS
2005
Springer
14 years 1 months ago
From Separation Logic to First-Order Logic
Separation logic is a spatial logic for reasoning locally about heap structures. A decidable fragment of its assertion language was presented in [1], based on a bounded model prope...
Cristiano Calcagno, Philippa Gardner, Matthew Hagu...
LREC
2010
219views Education» more  LREC 2010»
13 years 9 months ago
Approaches to Text Mining Arguments from Legal Cases
Abstract. This paper describes recent approaches using text-mining to automatically profile and extract arguments from legal cases. We outline some of the background context and mo...
Adam Wyner, Raquel Mochales Palau, Marie-Francine ...