-
1
-
-
84976763438
-
Behavior of database production rules: Termination, confluence, and observable determinism
-
San Diego, California
-
A. Aiken, J. Widom, J.M. Hellerstein, Behavior of database production rules: termination, confluence, and observable determinism, in: ACM SIGMOD International Conference on Management of Data (SIGMOD'92), San Diego, California, 1992, pp. 59-68.
-
(1992)
ACM SIGMOD International Conference on Management of Data (SIGMOD'92)
, pp. 59-68
-
-
Aiken, A.1
Widom, J.2
Hellerstein, J.M.3
-
2
-
-
0029277484
-
Static analysis techniques for predicting the behaviour of active databases rules
-
A. Aiken, M. Hellerstein, and J. Widom Static analysis techniques for predicting the behaviour of active databases rules ACM Transactions on Database Systems 20 1 1995 3 41
-
(1995)
ACM Transactions on Database Systems
, vol.20
, Issue.1
, pp. 3-41
-
-
Aiken, A.1
Hellerstein, M.2
Widom, J.3
-
3
-
-
0035328250
-
Toward context-aware computing: Experiences and lessons
-
J. Anhalt, A. Smailagic, D.P. Siewored, F. Gemperle, D. Salber, S. Weber, J. Beck, and J. Jennings Toward context-aware computing: experiences and lessons IEEE Intelligent Systems 16 3 2001 38 46
-
(2001)
IEEE Intelligent Systems
, vol.16
, Issue.3
, pp. 38-46
-
-
Anhalt, J.1
Smailagic, A.2
Siewored, D.P.3
Gemperle, F.4
Salber, D.5
Weber, S.6
Beck, J.7
Jennings, J.8
-
6
-
-
0012457085
-
Better termination analysis for active databases
-
Edinburgh, Scotland
-
E. Baralis, S. Ceri, J. Widom, Better termination analysis for active databases, in: International Workshop on Rules in Database Systems, Edinburgh, Scotland, 1994, pp. 163-179.
-
(1994)
International Workshop on Rules in Database Systems
, pp. 163-179
-
-
Baralis, E.1
Ceri, S.2
Widom, J.3
-
7
-
-
84958780318
-
Improved rule analysis by means of triggering and activation graphs
-
LNCS, Greece
-
E. Baralis, S. Ceri, S. Paraboschi, Improved rule analysis by means of triggering and activation graphs, in: International Workshop on Rules in Database Systems, vol. 985, LNCS, Greece, 1995, pp. 165-181.
-
(1995)
International Workshop on Rules in Database Systems
, vol.985
, pp. 165-181
-
-
Baralis, E.1
Ceri, S.2
Paraboschi, S.3
-
8
-
-
0000096346
-
An algebraic approach to static analysis of active database rules
-
E. Baralis, and J. Widom An algebraic approach to static analysis of active database rules ACM Transactions on Database Systems 25 3 2000 269 332
-
(2000)
ACM Transactions on Database Systems
, vol.25
, Issue.3
, pp. 269-332
-
-
Baralis, E.1
Widom, J.2
-
9
-
-
77953650496
-
Confluence and termination of fuzzy relations
-
R. Belohlavek, T. Kuhr, and V. Vychodil Confluence and termination of fuzzy relations Information Sciences 180 17 2010 3288 3303
-
(2010)
Information Sciences
, vol.180
, Issue.17
, pp. 3288-3303
-
-
Belohlavek, R.1
Kuhr, T.2
Vychodil, V.3
-
11
-
-
0030678870
-
Applying fuzzy events to approximate reasoning in active databases
-
Spain
-
T. Bouaziz, A. Wolski, Applying fuzzy events to approximate reasoning in active databases, in: IEEE International Conference on Fuzzy Systems, vol. 2, Spain, 1997, pp. 729-735.
-
(1997)
IEEE International Conference on Fuzzy Systems
, vol.2
, pp. 729-735
-
-
Bouaziz, T.1
Wolski, A.2
-
12
-
-
26844496057
-
The fuzzy and dynamic nature of trust
-
Springer
-
E. Chang, P. Thomson, T. Dillon, and F. Hussain The fuzzy and dynamic nature of trust LNCS vol. 3592 2005 Springer 161 174
-
(2005)
LNCS
, vol.3592 VOL.
, pp. 161-174
-
-
Chang, E.1
Thomson, P.2
Dillon, T.3
Hussain, F.4
-
13
-
-
77954335599
-
Fuzzy nature of trust and dynamic trust modeling in service oriented environments
-
Fairfax, USA
-
E. Chang, F. Hussain, T. Dillon, Fuzzy nature of trust and dynamic trust modeling in service oriented environments, in: Workshop on Secure Web Services, Fairfax, USA, 2005, pp. 75-83.
-
(2005)
Workshop on Secure Web Services
, pp. 75-83
-
-
Chang, E.1
Hussain, F.2
Dillon, T.3
-
15
-
-
0032674081
-
Active rule termination analysis: An implementation and evaluation of the refined triggering graph method
-
B. Elena, C. Stefano, and P. Stefano Active rule termination analysis: an implementation and evaluation of the refined triggering graph method Journal of Intelligent Information Systems 12 1999 27 60
-
(1999)
Journal of Intelligent Information Systems
, Issue.12
, pp. 27-60
-
-
Elena, B.1
Stefano, C.2
Stefano, P.3
-
16
-
-
84976810970
-
A structured approach for the definition of the semantics of active databases
-
P. Fraternali, and L. Tanca A structured approach for the definition of the semantics of active databases ACM Transactions on Database Systems 20 4 1995 414 471
-
(1995)
ACM Transactions on Database Systems
, vol.20
, Issue.4
, pp. 414-471
-
-
Fraternali, P.1
Tanca, L.2
-
17
-
-
34248226417
-
Operational semantics for Petri net components
-
J. Grootea, and M. Voorhoeve Operational semantics for Petri net components Theoretical Computer Science 379 1 2007 1 19
-
(2007)
Theoretical Computer Science
, vol.379
, Issue.1
, pp. 1-19
-
-
Grootea, J.1
Voorhoeve, M.2
-
18
-
-
0031118870
-
A survey of Petri net methods for controlled discrete event systems
-
L. Holloway, B. Krogh, and A. Giua A survey of Petri net methods for controlled discrete event systems Discrete Event Dynamic Systems 7 2 1997 151 190
-
(1997)
Discrete Event Dynamic Systems
, vol.7
, Issue.2
, pp. 151-190
-
-
Holloway, L.1
Krogh, B.2
Giua, A.3
-
19
-
-
84875413289
-
Secure interoperation design in multi-domains environments based on colored Petri nets
-
H. Huang, and H. Kirchner Secure interoperation design in multi-domains environments based on colored Petri nets Information Sciences 221 2013 591 606
-
(2013)
Information Sciences
, vol.221
, pp. 591-606
-
-
Huang, H.1
Kirchner, H.2
-
20
-
-
84958784177
-
An introduction to the theoretical aspects of Coloured Petri Nets
-
LNCS
-
K. Jensen, An introduction to the theoretical aspects of Coloured Petri Nets, in: A Decade of Concurrency Reflections and Perspectives, vol. 803, LNCS, 1994, pp. 230-272.
-
(1994)
A Decade of Concurrency Reflections and Perspectives
, vol.803
, pp. 230-272
-
-
Jensen, K.1
-
21
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
L. Kagal, T. Finin, and A. Joshi Trust-based security in pervasive computing environments IEEE Computer 34 12 2001 154 157
-
(2001)
IEEE Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
22
-
-
68849097589
-
Constrained regulation of continuous Petri nets
-
R. Kara, M. Ahmane, J.J. Loiseau, and S. Djennoune Constrained regulation of continuous Petri nets Nonlinear Analysis: Hybrid Systems 3 4 2009 738 748
-
(2009)
Nonlinear Analysis: Hybrid Systems
, vol.3
, Issue.4
, pp. 738-748
-
-
Kara, R.1
Ahmane, M.2
Loiseau, J.J.3
Djennoune, S.4
-
25
-
-
33750962676
-
An ECA rule-based task programming language for ubiquitous environments
-
Phoenix Park
-
K. Lee, E. Cho, H. Kim, An ECA rule-based task programming language for ubiquitous environments, in: International Conference on Advanced Communication Technology (ICACT'2006), Phoenix Park, 2006, pp. 357-360.
-
(2006)
International Conference on Advanced Communication Technology (ICACT'2006)
, pp. 357-360
-
-
Lee, K.1
Cho, E.2
Kim, H.3
-
26
-
-
33947387917
-
Trust management in distributed systems
-
H. Li, and M. Singhal Trust management in distributed systems IEEE Computer 40 2 2007 45 53
-
(2007)
IEEE Computer
, vol.40
, Issue.2
, pp. 45-53
-
-
Li, H.1
Singhal, M.2
-
27
-
-
77951117151
-
ECA rule analysis in a distributed active database
-
Kinabalu
-
J. Medina, G. Perez, X. Li, ECA rule analysis in a distributed active database, in: International Conference on Computer Technology and Development, Kinabalu, 2009, pp. 113-116.
-
(2009)
International Conference on Computer Technology and Development
, pp. 113-116
-
-
Medina, J.1
Perez, G.2
Li, X.3
-
28
-
-
0032599301
-
Termination analysis in active databases
-
Canada
-
D. Montesi, M. Bagnato, C. Dallera, Termination analysis in active databases, in: International Database Engineering and Applications Symposium, Canada, 1999, pp. 288-297.
-
(1999)
International Database Engineering and Applications Symposium
, pp. 288-297
-
-
Montesi, D.1
Bagnato, M.2
Dallera, C.3
-
29
-
-
77950255206
-
Fuzzy ECA rules for pervasive decision-centric personalised mobile learning
-
P. Moore, M. Jackson, B. Hu, Fuzzy ECA rules for pervasive decision-centric personalised mobile learning, in: Studies in Computational Intelligence: Computational Intelligence for Technology Enhanced Learning, vol. 273, 2010, pp. 25-58.
-
(2010)
Studies in Computational Intelligence: Computational Intelligence for Technology Enhanced Learning
, vol.273
, pp. 25-58
-
-
Moore, P.1
Jackson, M.2
Hu, B.3
-
30
-
-
0024645936
-
Petri nets: Properties, analysis and applications
-
T. Murata Petri nets: properties, analysis and applications Proceedings of the IEEE 77 4 1989 541 580
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
31
-
-
0002892316
-
Active database systems
-
N. Paton, and O. Diaz Active database systems ACM Computing Surveys 31 1 1999 63 103
-
(1999)
ACM Computing Surveys
, vol.31
, Issue.1
, pp. 63-103
-
-
Paton, N.1
Diaz, O.2
-
35
-
-
0033355008
-
Dealing with fuzziness in active mobile database systems
-
Y. Saygin, O. Ulusoy, and A. Yazici Dealing with fuzziness in active mobile database systems Information Sciences 120 1 1999 23 44
-
(1999)
Information Sciences
, vol.120
, Issue.1
, pp. 23-44
-
-
Saygin, Y.1
Ulusoy, O.2
Yazici, A.3
-
37
-
-
33749531244
-
An ECA-P policy-based framework for managing ubiquitous computing environments
-
San Diego, California
-
C. Shankar, A. Ranganathan, R. Campbell, An ECA-P policy-based framework for managing ubiquitous computing environments, in: Proc. of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'05), San Diego, California, 2005, pp. 33-42.
-
(2005)
Proc. of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'05)
, pp. 33-42
-
-
Shankar, C.1
Ranganathan, A.2
Campbell, R.3
-
38
-
-
46749123518
-
Enhancing role-based access control model through fuzzy relations
-
Manchester, United Kingdom
-
H. Takabi, M. Amini, R. Jalili, Enhancing role-based access control model through fuzzy relations, in: International Symposium on Information Assurance and Security, Manchester, United Kingdom, 2007, pp. 131-136.
-
(2007)
International Symposium on Information Assurance and Security
, pp. 131-136
-
-
Takabi, H.1
Amini, M.2
Jalili, R.3
-
39
-
-
0001853125
-
The computer for the twenty-first century
-
M. Weiser The computer for the twenty-first century Scientific American 265 3 1991 94 104
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
41
-
-
4544255829
-
Pervasive/ubiquitous computing
-
(in Chinese)
-
G. Xu, Y. Shi, and W. Xie Pervasive/ubiquitous computing Chinese Journal of Computers 26 9 2003 1024 1050 (in Chinese)
-
(2003)
Chinese Journal of Computers
, vol.26
, Issue.9
, pp. 1024-1050
-
-
Xu, G.1
Shi, Y.2
Xie, W.3
-
42
-
-
42749097020
-
Is there a need for fuzzy logic
-
L. Zadeh Is there a need for fuzzy logic Information Sciences 178 13 2008 2751 2779
-
(2008)
Information Sciences
, vol.178
, Issue.13
, pp. 2751-2779
-
-
Zadeh, L.1
-
43
-
-
71549166510
-
On the unification of active and deductive databases
-
LNCS
-
C. Zaniolo, On the unification of active and deductive databases, in: British National Conference on Databases, vol. 696, LNCS, 1993, pp. 23-39.
-
(1993)
British National Conference on Databases
, vol.696
, pp. 23-39
-
-
Zaniolo, C.1
-
44
-
-
77957679767
-
Some information measures for interval-valued intuitionistic fuzzy sets
-
Q. Zhang, S. Jiang, B. Jia, and S. Luo Some information measures for interval-valued intuitionistic fuzzy sets Information Sciences 180 24 2010 5130 5145
-
(2010)
Information Sciences
, vol.180
, Issue.24
, pp. 5130-5145
-
-
Zhang, Q.1
Jiang, S.2
Jia, B.3
Luo, S.4
|