Sciweavers

315 search results - page 16 / 63
» Claims Analysis
Sort
View
131
Voted
CMS
2006
127views Communications» more  CMS 2006»
15 years 5 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
120
Voted
NAACL
2004
15 years 5 months ago
A Probabilistic Rasch Analysis of Question Answering Evaluations
The field of Psychometrics routinely grapples with the question of what it means to measure the inherent ability of an organism to perform a given task, and for the last forty yea...
Rense Lange, Juan Moran, Warren R. Greiff, Lisa Fe...
158
Voted
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
15 years 3 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
142
Voted
SCP
1998
138views more  SCP 1998»
15 years 3 months ago
A Hierarchy of Constraint Systems for Data-Flow Analysis of Constraint Logic-Based Languages
Many interesting analyses for constraint logic-based languages are aimed at the detection of monotonic properties, that is to say, properties that are preserved as the computation...
Roberto Bagnara
109
Voted
SIGSOFT
2006
ACM
16 years 4 months ago
Local analysis of atomicity sphere for B2B collaboration
Atomicity is a desirable property for business processes to conduct transactions in Business-to-Business (B2B) collaboration. Although it is possible to reason about atomicity of ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu