Sciweavers

314 search results - page 8 / 63
» Cubical token systems
Sort
View
ISORC
2007
IEEE
14 years 2 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Co...
Christoph Becker, Sebastian Staamann, Ralf Salomon
APN
2007
Springer
14 years 2 months ago
Nets with Tokens Which Carry Data
Abstract. We study data nets, a generalisation of Petri nets in which tokens carry data from linearlyordered infinite domains and in which whole-place operations such as resets an...
Ranko Lazic, Thomas Christopher Newcomb, Joël...
LREC
2010
121views Education» more  LREC 2010»
13 years 10 months ago
Ngram Search Engine with Patterns Combining Token, POS, Chunk and NE Information
We developed a search tool for ngrams extracted from a very large corpus (the current system uses the entire Wikipedia, which has
Satoshi Sekine, Kapil Dalwani
CONCUR
2005
Springer
14 years 2 months ago
The Individual and Collective Token Interpretations of Petri Nets
Starting from the opinion that the standard firing rule of Petri nets embodies the collective token interpretation of nets rather than their individual token interpretation, I pro...
Rob J. van Glabbeek
JCS
2011
87views more  JCS 2011»
13 years 3 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke