Sciweavers

857 search results - page 111 / 172
» A Formal Framework for Adaptive Access Control Models
Sort
View
ALT
2007
Springer
14 years 4 months ago
One-Shot Learners Using Negative Counterexamples and Nearest Positive Examples
As some cognitive research suggests, in the process of learning languages, in addition to overt explicit negative evidence, a child often receives covert explicit evidence in form...
Sanjay Jain, Efim B. Kinber
ER
2000
Springer
112views Database» more  ER 2000»
13 years 11 months ago
Ontological Analysis of Taxonomic Relationships
Taxonomies are an important part of conceptual modeling. They provide substantial structural information, and are typically the key elements in integration eorts, however there ha...
Nicola Guarino, Christopher A. Welty
TES
2001
Springer
14 years 3 days ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
12 years 11 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
SAFECOMP
1998
Springer
13 years 11 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha