Sciweavers

4135 search results - page 706 / 827
» Application Modeling for the Semantic Web
Sort
View
SOSYM
2010
107views more  SOSYM 2010»
15 years 2 months ago
A UML/OCL framework for the analysis of graph transformation rules
In this paper we present an approach for the analysis of graph transformation rules based on an intermediate OCL representation. We translate different rule semantics into OCL, to...
Jordi Cabot, Robert Clarisó, Esther Guerra,...
IACR
2011
94views more  IACR 2011»
14 years 4 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
EDBTW
2010
Springer
15 years 7 months ago
The benefits of the interaction between data warehouses and question answering
Business Intelligence (BI) applications allow their users to query, understand, and analyze existing data within their organizations in order to acquire useful knowledge, thus mak...
Antonio Ferrández, Jesús Peral
SEMCO
2008
IEEE
15 years 10 months ago
Using Similarity Measures for Context-Aware User Interfaces
Context-aware user interfaces facilitate the user interaction by suggesting or prefilling data derived from the user’s current context. This raises the problem of mapping conte...
Melanie Hartmann, Torsten Zesch, Max Mühlh&au...
CGO
2006
IEEE
15 years 10 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...