Sciweavers

5255 search results - page 953 / 1051
» Formal Methods for Privacy
Sort
View
ISICT
2004
15 years 3 months ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang
156
Voted
DMDW
2003
134views Management» more  DMDW 2003»
15 years 3 months ago
Using Design Guidelines to Improve Data Warehouse Logical Design
Data Warehouse-(DW) logical design often start with a conceptual schema and then generates relational structures. Applying this approach implies to cope with two main aspects: (i) ...
Verónika Peralta, Raul Ruggia
ISTA
2004
15 years 3 months ago
Evidential Paradigm and Intelligent Mathematical Text Processing
Abstract: This paper presents the evidential paradigm of computer-supported mathematical assistance in "doing" mathematics and in reasoning activity. At present, the evid...
Alexander V. Lyaletski, Anatoly E. Doroshenko, And...
EACL
2003
ACL Anthology
15 years 3 months ago
AVM Description Compilation using Types as Modes
This paper provides a method for generating compact and efficient code to implement the enforcement of a description in typed feature logic. It does so by viewing information abo...
Gerald Penn
EUSFLAT
2003
161views Fuzzy Logic» more  EUSFLAT 2003»
15 years 3 months ago
Fuzzy interpolation and level 2 gradual rules
Functional laws may be known only at a finite number of points, and then the function can be completed by interpolation techniques obeying some smoothness conditions. We rather pr...
Sylvie Galichet, Didier Dubois, Henri Prade