Sciweavers

1115 search results - page 132 / 223
» An Abstract Look at Realizability
Sort
View
EIT
2008
IEEE
15 years 6 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
ESORICS
2008
Springer
15 years 6 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
ESWS
2008
Springer
15 years 6 months ago
dRDF: Entailment for Domain-Restricted RDF
Abstract. We introduce domain-restricted RDF (dRDF) which allows to associate an RDF graph with a fixed, finite domain that interpretations for it may range over. We show that dRDF...
Reinhard Pichler, Axel Polleres, Fang Wei, Stefan ...
COMMA
2008
15 years 5 months ago
Focused search for Arguments from Propositional Knowledge
Abstract Classical propositional logic is an appealing option for modelling argumentation but the computational viability of generating an argument is an issue. Here we propose ame...
Vasiliki Efstathiou, Anthony Hunter
LREC
2010
225views Education» more  LREC 2010»
15 years 5 months ago
An Automatic System for Summarization and Information Extraction of Legal Information
Abstract. This paper presents an information system for legal professionals that integrates natural language processing technologies such as text classification and summarization. ...
Emmanuel Chieze, Atefeh Farzindar, Guy Lapalme