Sciweavers

1428 search results - page 41 / 286
» aim 2010
Sort
View
ENTCS
2007
121views more  ENTCS 2007»
13 years 8 months ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle
ENTCS
2007
112views more  ENTCS 2007»
13 years 8 months ago
A Calculus of Global Interaction based on Session Types
This paper proposes a calculus for describing communication-centred programs and discusses its use through a formal description of several use cases from real business protocols. ...
Marco Carbone, Kohei Honda, Nobuko Yoshida
ENTCS
2007
101views more  ENTCS 2007»
13 years 8 months ago
Solving Sudoku Puzzles with Rewriting Rules
The aim of the sudoku puzzle (also known as number place in the United States) is to enter a numeral from 1 through 9 in each cell of a grid, most frequently a 9 × 9 grid made up...
Gustavo Santos-García, Miguel Palomino
ENTCS
2007
107views more  ENTCS 2007»
13 years 8 months ago
Applications = Components + GLoo
We are advocating a component-oriented software development approach that provides support for a clear separation between the computational and the compositional entities of an ap...
Markus Lumpe
ENTCS
2007
85views more  ENTCS 2007»
13 years 8 months ago
Stochastic Modelling of Communication Protocols from Source Code
A major development in qualitative model checking was the jump to verifying properties of source code directly, rather than requiring a separately specified model. We describe an...
Michael J. A. Smith