Sciweavers

3179 search results - page 5 / 636
» Applications of PCF Theory
Sort
View
CCS
2010
ACM
13 years 4 months ago
Cap unification: application to protocol security modulo homomorphic encryption
We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. The protocol steps are modeled as rigid Horn clauses, and t...
Siva Anantharaman, Hai Lin, Christopher Lynch, Pal...
HICSS
2000
IEEE
135views Biometrics» more  HICSS 2000»
13 years 12 months ago
The IT Performance Evaluation in the Construction Industry
To date there has been limited published work in the construction management and engineering literature that has provided empirical evidence to demonstrate that IT can improve org...
Heng Li, Zahir Irani, Peter E. D. Love
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 4 months ago
Kolmogorov Complexity in perspective. Part I: Information Theory and Randomnes
We survey diverse approaches to the notion of information: from Shannon entropy to Kolmogorov complexity. Two of the main applications of Kolmogorov complexity are presented: rand...
Marie Ferbus-Zanda, Serge Grigorieff
ER
2009
Springer
152views Database» more  ER 2009»
13 years 5 months ago
Towards a Theory of Conceptual Modelling
: Conceptual modelling is a widely applied practice and has led to a large body of knowledge on constructs that might be used for modelling and on methods that might be useful for ...
Bernhard Thalheim