Sciweavers

234 search results - page 27 / 47
» Deduction, Strategies, and Rewriting
Sort
View
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 7 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
SEC
2008
13 years 9 months ago
Negotiation of Prohibition: An Approach Based on Policy Rewriting
Abstract. In recent security architectures, it is possible that the security policy is not evaluated in a centralized way but requires negotiation between the subject who is reques...
Nora Cuppens-Boulahia, Frédéric Cupp...
ENTCS
2007
112views more  ENTCS 2007»
13 years 7 months ago
Structure and Properties of Traces for Functional Programs
The tracer Hat records in a detailed trace the computation of a program written in the lazy functional language Haskell. The trace can then be viewed in various ways to support pr...
Olaf Chitil, Yong Luo
FLAIRS
2008
13 years 10 months ago
Declarative Specification and Interpretation of Rule-Based Systems
A declarative rule inference engine can be very useful for modern distributed or heterogeneous applications, if it can be configured for multiple semantics and evaluation strategi...
Dietmar Seipel, Joachim Baumeister
JUCS
2006
91views more  JUCS 2006»
13 years 7 months ago
Creation and Evaluation of Fuzzy Knowledge-base
: In this paper we give a possible model for handling uncertain information. The concept of fuzzy knowledge-base will be defined as a quadruple of any background knowledge, defined...
Ágnes Achs