Sciweavers

2486 search results - page 449 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
IV
2009
IEEE
107views Visualization» more  IV 2009»
15 years 10 months ago
Multiscale Visual Analysis of Lexical Networks
A lexical network is a very useful resource for natural language processing systems. However, building high quality lexical networks is a complex task. “Jeux de mots” is a web...
Guillaume Artignan, Mountaz Hascoët, Mathieu ...
AMAI
2000
Springer
15 years 3 months ago
The logic of events
An event space is a set of instantaneous events that vary both in time and specificity. The concept of an event space provides a foundation for a logical--i.e., modular and open-a...
Glenn Shafer, Peter R. Gillett, Richard B. Scherl
I3
2007
15 years 5 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 10 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
15 years 9 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu