761 research outputs found

    Special Issue on Order-sorted Rewriting: Foreword of the Guest Editor

    Get PDF

    Security Policies as Membranes in Systems for Global Computing

    Get PDF
    We propose a simple global computing framework, whose main concern is code migration. Systems are structured in sites, and each site is divided into two parts: a computing body, and a membrane which regulates the interactions between the computing body and the external environment. More precisely, membranes are filters which control access to the associated site, and they also rely on the well-established notion of trust between sites. We develop a basic theory to express and enforce security policies via membranes. Initially, these only control the actions incoming agents intend to perform locally. We then adapt the basic theory to encompass more sophisticated policies, where the number of actions an agent wants to perform, and also their order, are considered

    Critical behavior at Mott-Anderson transition: a TMT-DMFT perspective

    Full text link
    We present a detailed analysis of the critical behavior close to the Mott-Anderson transition. Our findings are based on a combination of numerical and analytical results obtained within the framework of Typical-Medium Theory (TMT-DMFT) - the simplest extension of dynamical mean field theory (DMFT) capable of incorporating Anderson localization effects. By making use of previous scaling studies of Anderson impurity models close to the metal-insulator transition, we solve this problem analytically and reveal the dependence of the critical behavior on the particle-hole symmetry. Our main result is that, for sufficiently strong disorder, the Mott-Anderson transition is characterized by a precisely defined two-fluid behavior, in which only a fraction of the electrons undergo a "site selective" Mott localization; the rest become Anderson-localized quasiparticles.Comment: 4+ pages, 4 figures, v2: minor changes, accepted for publication in Phys. Rev. Let

    Towards a Declarative Query and Transformation Language for XML and Semistructured Data: Simulation Unification

    Get PDF
    The growing importance of XML as a data interchange standard demands languages for data querying and transformation. Since the mid 90es, several such languages have been proposed that are inspired from functional languages (such as XSLT [1]) and/or database query languages (such as XQuery [2]). This paper addresses applying logic programming concepts and techniques to designing a declarative, rule-based query and transformation language for XML and semistructured data. The paper first introduces issues specific to XML and semistructured data such as the necessity of flexible “query terms” and of “construct terms”. Then, it is argued that logic programming concepts are particularly appropriate for a declarative query and transformation language for XML and semistructured data. Finally, a new form of unification, called “simulation unification”, is proposed for answering “query terms”, and it is illustrated on examples

    Application of LANDSAT and Skylab data for land use mapping in Italy

    Get PDF
    Utilizing LANDSAT and Skylab multispectral imagery of 1972 and 1973, a land use map of the mountainous regions of Italy was evaluated at a scale of 1:250,000. Seven level I categories were identified by conventional methods of photointerpretation. Images of multispectral scanner (MSS) bands 5 and 7, or equivalents were mainly used. Areas of less than 200 by 200 m were classified and standard procedures were established for interpretation of multispectral satellite imagery. Land use maps were produced for central and southern Europe indicating that the existing land use maps could be updated and optimized. The complexity of European land use patterns, the intensive morphology of young mountain ranges, and time-cost calculations are the reasons that the applied conventional techniques are superior to automatic evaluation

    A Declarative Framework for Security: Secure Concurrent Constraint Programming

    Get PDF
    International audienceDue to technological advances such as the Internet and mobile computing, Security has become a serious challenge involving several disciplines of Computer Science. In recent years, there has been a growing interest in the analysis of security protocols and one promising approach is the development of formalisms that model communicating processes, in particular Process Calculi. The results are so far encouraging although most remains to be done. In this paper we report our observations and preliminary work on CCP as a framework for security protocols
    • …
    corecore