Sciweavers

953 search results - page 168 / 191
» Constraint Based Transformation Theory
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 6 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
TWC
2010
13 years 3 months ago
Coordinated beamforming for the multicell multi-antenna wireless system
In a conventional wireless cellular system, signal processing is performed on a per-cell basis; out-of-cell interference is treated as background noise. This paper considers the be...
Hayssam Dahrouj, Wei Yu
CORR
2011
Springer
143views Education» more  CORR 2011»
13 years 16 days ago
Probabilistic Logic: Many-valuedness and Intensionality
The probability theory is a well-studied branch of mathematics, in order to carry out formal reasoning about probability. Thus, it is important to have a logic, both for computati...
Zoran Majkic
PODS
2006
ACM
122views Database» more  PODS 2006»
14 years 8 months ago
Inverting schema mappings
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin
POPL
1998
ACM
14 years 29 days ago
From System F to Typed Assembly Language
abstractions, such as closures, tuples, and user-defined abstract data types. The type system ensures that well-typed programs cannot violate these abstractions. In addition, the ...
J. Gregory Morrisett, David Walker, Karl Crary, Ne...