Sciweavers

1615 search results - page 60 / 323
» What's new
Sort
View
DEON
2008
Springer
13 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
JOT
2007
95views more  JOT 2007»
13 years 9 months ago
The Infer Type Refactoring and its Use for Interface-Based Programming
Interface-based programming, i.e. the systematic use of interface types in variable declarations, serves the decoupling of classes and increases a program’s changeability. To ma...
Friedrich Steimann
ACL
1993
13 years 11 months ago
Identifying Relevant Prior Explanations
When human tutors engage in dialogue, they freely exploit allaspects of the mutually known context, including the previous discourse. Utterances that do not draw on previous disco...
James A. Rosenblum
BMCBI
2008
94views more  BMCBI 2008»
13 years 9 months ago
A comprehensive re-analysis of the Golden Spike data: Towards a benchmark for differential expression methods
Background: The Golden Spike data set has been used to validate a number of methods for summarizing Affymetrix data sets, sometimes with seemingly contradictory results. Much less...
Richard D. Pearson
NJC
2000
99views more  NJC 2000»
13 years 9 months ago
An Incremental Unique Representation for Regular Trees
In order to deal with infinite regular trees (or other pointed graph structures) efficiently, we give new algorithms to store such structures. The trees are stored in such a way th...
Laurent Mauborgne