Suchergebnisse - "Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms"
-
1
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Algorithms, Theory Additional Key Words and Phrases, Proof complexity, parameterized complexity, Resolution, Prover-Delayer games ACM Reference Format
Dateibeschreibung: application/pdf
-
2
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors H.2.3 [Database management systems, Languages— query languages, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems— Complexity of proof procedures General Terms Algorithms, Theory Keywords XPath, trees, satisfiability
Dateibeschreibung: application/pdf
-
3
Autoren:
Weitere Verfasser:
Schlagwörter: Mathematical Logic—Modal Logic, Computational Logic, F.2.2. [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of Proof Procedures General Terms, Algorithms, Languages, Theory Additional Key Words and Phrases, Shallow models, resolution, coalgebra
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.939; http://tocl.acm.org/accepted/352schroeder.pdf
-
4
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Dateibeschreibung: application/pdf
-
5
Autoren:
Weitere Verfasser:
Schlagwörter: Mathematical Logic—Modal Logic, Computational Logic, F.2.2. [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of Proof Procedures General Terms, Algorithms, Languages, Theory Additional Key Words and Phrases, Shallow models, resolution, coalgebra
Dateibeschreibung: application/pdf
-
6
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.2773; http://www.cs.purdue.edu/homes/ninghui/papers/resiliency_ccs06.pdf
-
7
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory, Languages Keywords Access Control, Separation of Duty, Policy Design
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5374; http://www.cs.purdue.edu/homes/ninghui/papers/algebra_ccs06.pdf
-
8
Autoren:
Weitere Verfasser:
Schlagwörter: Mathematical Logic—Modal Logic, Computational Logic, F.2.2. [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of Proof Procedures General Terms, Algorithms, Languages, Theory Additional Key Words and Phrases, Shallow models, resolution, coalgebra
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.75; http://www.doc.ic.ac.uk/~dirk/Publications/tocl2008.pdf
-
9
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors, F.4.1 [Mathematical Logic and Formal Languages, Mathematical Logic--computational logic, lambda calculus and related systems, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems-- complexity of proof procedures General Terms, Theory Additional Key Words and Phrases, elementary recursive functions, complexity, lambda calculus, second order logic
Dateibeschreibung: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5408; http://www.tcs.ifi.lmu.de/~jjohanns/papers/elf.ps.gz
-
10
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: and Protection, D.4.6 [Operating Systems, Security and Protection—Access controls, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory, Languages Additional Key Words and Phrases, access control, trust management, distributed system security, logic
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.4238; http://www.cs.utsa.edu/~winsboro/index_files/Papers/Safety_JACM_AcceptedVersion.pdf
-
11
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords role-based access control
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.320.4355; http://www.cs.purdue.edu/homes/ninghui/papers/sod_ccs04.pdf
-
12
Autoren:
Weitere Verfasser:
Schlagwörter: Nonnumerical Algorithms and Problems|complexity of proof procedures General terms, Algorithms, Theory Additional Key Words and Phrases, Data ow frameworks, data ow analysis, bidirectional data ows
Dateibeschreibung: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.24.3128; http://www.iitb.ernet.in:8000/~uday/t1271.ps
-
13
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Dateibeschreibung: application/pdf
-
14
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Algorithms, Theory Additional Key Words and Phrases, Proof complexity, parameterized complexity, Resolution, bounded-depth Frege ACM Reference Format
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.4930; http://people.cs.uchicago.edu/~razborov/files/parres.pdf
-
15
Weitere Verfasser: The Pennsylvania State University CiteSeerX Archives
Schlagwörter: Categories and Subject Descriptors, D.3.4 [Programming Languages, Processors-- Compilers, Optimization, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems--complexity of proof procedures General terms, Algorithms, Theory Additional Key Words and Phrases, Data flow frameworks, data flow analysis, bidirectional data flows
Dateibeschreibung: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.4599; http://www.cse.iitb.ac.in/~dmd/genth.ps
-
16
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protec- tion, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory Additional Key Words and Phrases, Access control, fault-tolerant, policy design ACM Reference Format
Dateibeschreibung: application/pdf
Nájsť tento článok vo Web of Science