Sciweavers

596 search results - page 17 / 120
» Theories of Access Consciousness
Sort
View
CCS
2004
ACM
14 years 24 days ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
IJAMC
2008
93views more  IJAMC 2008»
13 years 7 months ago
Meaningful access: policy, management and orchestration
: Access management for learning communities requires a unified theory, sustaining the implementation of instructional policies, for `social networks'. The management method w...
Ioan Rosca, Val Rosca
ICDE
2007
IEEE
178views Database» more  ICDE 2007»
14 years 8 months ago
Efficient Skyline Query Processing on Peer-to-Peer Networks
Skyline query has been gaining much interest in database research communities in recent years. Most existing studies focus mainly on centralized systems, and resolving the problem...
Shiyuan Wang, Beng Chin Ooi, Anthony K. H. Tung, L...
PDS
1996
13 years 8 months ago
Towards a theory of shared data in distributed systems
We have developed a theory of sharing which captures the behaviour of programs with respect to shared data into the framework of process algebra. The core theory can describe prog...
Simon A. Dobson, Christopher P. Wadsworth
CADE
2001
Springer
14 years 7 months ago
Hilberticus - A Tool Deciding an Elementary Sublanguage of Set Theory
We present a tool deciding a fragment of set theory. It is designed to be easily accessible via the internet and intuitively usable by anyone who is working with sets to describe a...
Jörg Lücke