Sciweavers

2486 search results - page 449 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
IV
2009
IEEE
107views Visualization» more  IV 2009»
14 years 3 months ago
Multiscale Visual Analysis of Lexical Networks
A lexical network is a very useful resource for natural language processing systems. However, building high quality lexical networks is a complex task. “Jeux de mots” is a web...
Guillaume Artignan, Mountaz Hascoët, Mathieu ...
AMAI
2000
Springer
13 years 8 months ago
The logic of events
An event space is a set of instantaneous events that vary both in time and specificity. The concept of an event space provides a foundation for a logical--i.e., modular and open-a...
Glenn Shafer, Peter R. Gillett, Richard B. Scherl
I3
2007
13 years 10 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 3 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
14 years 2 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu