Sciweavers

13383 search results - page 2315 / 2677
» Abstractions from proofs
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 8 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
DIMVA
2011
14 years 8 months ago
What's Clicking What? Techniques and Innovations of Today's Clickbots
Abstract. With the widespread adoption of Internet advertising, fraud has become a systemic problem. While the existence of clickbots—malware specialized for conducting click-fra...
Brad Miller, Paul Pearce, Chris Grier, Christian K...
DLOG
2011
14 years 8 months ago
Repairing Incomplete Reasoners
Abstract. The pressing need for scalable query answering has motivated the development of many incomplete ontology-based reasoners. Improving the completeness of such systems witho...
Giorgos Stoilos, Bernardo Cuenca Grau
DLOG
2011
14 years 8 months ago
Concept Model Semantics for DL Preferential Reasoning
Abstract. The preferential and rational consequence relations first studied by Lehmann and colleagues play a central role in non-monotonic reasoning, not least because they provid...
Arina Britz, Thomas Meyer, Ivan José Varzin...
DSS
2011
14 years 8 months ago
Estimating the effect of word of mouth on churn and cross-buying in the mobile phone market with Markov logic networks
Abstract: Much has been written about word of mouth and customer behavior. Telephone call detail records provide a novel way to understand the strength of the relationship between ...
Torsten Dierkes, Martin Bichler, Ramayya Krishnan
« Prev « First page 2315 / 2677 Last » Next »