Sciweavers

1061 search results - page 53 / 213
» A general definition of malware
Sort
View
POPL
2010
ACM
14 years 7 months ago
Nominal System T
This paper introduces a new recursion principle for inductive data modulo -equivalence of bound names. It makes use of Oderskystyle local names when recursing over bound names. It...
Andrew M. Pitts
ICS
2010
Tsinghua U.
14 years 7 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
WETICE
2008
IEEE
14 years 4 months ago
Wolf - An Eclipse Plug-In for WADE
This paper describes WOLF, a development environment for WADE-based applications. WADE is a software platform, based on JADE, a popular Open Source framework, for the development ...
Giovanni Caire, Marisa Porta, Elena Quarantotto, G...
CIARP
2008
Springer
13 years 11 months ago
Measuring the Related Properties of Linearity and Elongation of Point Sets
The concept of elongation is generally well understood. However, there is no clear, precise, mathematical definition of elongation in any dictionary we could find. We propose that ...
Milos Stojmenovic, Amiya Nayak
CADE
2006
Springer
14 years 10 months ago
CEL - A Polynomial-Time Reasoner for Life Science Ontologies
CEL (Classifier for EL) is a reasoner for the small description logic EL+ which can be used to compute the subsumption hierarchy induced by EL+ ontologies. The most distinguishing ...
Franz Baader, Carsten Lutz, Boontawee Suntisrivara...