…, K Moody, M Migliavacca, D Eyers, J Bacon - Reasoning in Event- …, 2011 - Springer Abstract. Linking security policy into event-based systems allows formal reasoning about information security. In the applications we address, highly confidential data must be shared both dynamically and for historical anal- ysis. Principals with rights to access the data may be widely ... Related articles - All 2 versions
J Bacon, PR Pietzuch… - IFIP Lecture Notes in Computer Science …, 2011 - dl.ifip.org For large-scale distributed applications such as internet-wide or ubiquitous systems, event-based communication is an effective messaging mechanism between components. In order to handle the large volume of events in such systems, composite event detection enables ... Cached
[PDF] from arxiv.org…, LM Young, K Alatalo, R Bacon… - Monthly Notices of …, 2011 - Wiley Online Library Observations of high-redshift galaxies and the cosmic microwave background (Spergel et al. 2007) have revealed the Universe to be dominated by dark matter and dark energy (Riess et al. 1998; Perlmutter et al. 1999), providing a working paradigm for the formation of ... Cited by 20 - Related articles - All 5 versions
[PDF] from arxiv.org…, M Cappellari, E Emsellem, R Bacon… - Monthly Notices of …, 2011 - Wiley Online Library Roland Bacon,5 Roger L. Davies and P. Tim de Zeeuw4,6 1Centre for Astrophysics Research, University of Hertfordshire, College Lane, Hatfield, Herts, AL10 9AB 2Institut d'Astrophysique de Paris (UMR 7095: CNRS & UPMC), 98 bis Bd. Arago, 75014 Paris, France 3Sub-Dept ... Related articles - All 5 versions