761 research outputs found
Security Policies as Membranes in Systems for Global Computing
We propose a simple global computing framework, whose main concern is code migration. Systems are structured in sites, and each site is divided into two parts: a computing body, and a membrane which regulates the interactions between the computing body and the external environment. More precisely, membranes are filters which control access to the associated site, and they also rely on the well-established notion of trust between sites. We develop a basic theory to express and enforce security policies via membranes. Initially, these only control the actions incoming agents intend to perform locally. We then adapt the basic theory to encompass more sophisticated policies, where the number of actions an agent wants to perform, and also their order, are considered
Importance of deer to resident and nonresident recreational experiences in Northern New York
152 page
Critical behavior at Mott-Anderson transition: a TMT-DMFT perspective
We present a detailed analysis of the critical behavior close to the
Mott-Anderson transition. Our findings are based on a combination of numerical
and analytical results obtained within the framework of Typical-Medium Theory
(TMT-DMFT) - the simplest extension of dynamical mean field theory (DMFT)
capable of incorporating Anderson localization effects. By making use of
previous scaling studies of Anderson impurity models close to the
metal-insulator transition, we solve this problem analytically and reveal the
dependence of the critical behavior on the particle-hole symmetry. Our main
result is that, for sufficiently strong disorder, the Mott-Anderson transition
is characterized by a precisely defined two-fluid behavior, in which only a
fraction of the electrons undergo a "site selective" Mott localization; the
rest become Anderson-localized quasiparticles.Comment: 4+ pages, 4 figures, v2: minor changes, accepted for publication in
Phys. Rev. Let
Towards a Declarative Query and Transformation Language for XML and Semistructured Data: Simulation Unification
The growing importance of XML as a data interchange standard demands languages for data querying and transformation. Since the mid 90es, several such languages have been proposed that are inspired from functional languages (such as XSLT [1]) and/or database query languages (such as XQuery [2]). This paper addresses applying logic programming concepts and techniques to designing a declarative, rule-based query and transformation language for XML and semistructured data. The paper first introduces issues specific to XML and semistructured data such as the necessity of flexible “query terms” and of “construct terms”. Then, it is argued that logic programming concepts are particularly appropriate for a declarative query and transformation language for XML and semistructured data. Finally, a new form of unification, called “simulation unification”, is proposed for answering “query terms”, and it is illustrated on examples
Application of LANDSAT and Skylab data for land use mapping in Italy
Utilizing LANDSAT and Skylab multispectral imagery of 1972 and 1973, a land use map of the mountainous regions of Italy was evaluated at a scale of 1:250,000. Seven level I categories were identified by conventional methods of photointerpretation. Images of multispectral scanner (MSS) bands 5 and 7, or equivalents were mainly used. Areas of less than 200 by 200 m were classified and standard procedures were established for interpretation of multispectral satellite imagery. Land use maps were produced for central and southern Europe indicating that the existing land use maps could be updated and optimized. The complexity of European land use patterns, the intensive morphology of young mountain ranges, and time-cost calculations are the reasons that the applied conventional techniques are superior to automatic evaluation
A Declarative Framework for Security: Secure Concurrent Constraint Programming
International audienceDue to technological advances such as the Internet and mobile computing, Security has become a serious challenge involving several disciplines of Computer Science. In recent years, there has been a growing interest in the analysis of security protocols and one promising approach is the development of formalisms that model communicating processes, in particular Process Calculi. The results are so far encouraging although most remains to be done. In this paper we report our observations and preliminary work on CCP as a framework for security protocols
- …