Sciweavers

5255 search results - page 953 / 1051
» Formal Methods for Privacy
Sort
View
ISICT
2004
13 years 11 months ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang
DMDW
2003
134views Management» more  DMDW 2003»
13 years 11 months ago
Using Design Guidelines to Improve Data Warehouse Logical Design
Data Warehouse-(DW) logical design often start with a conceptual schema and then generates relational structures. Applying this approach implies to cope with two main aspects: (i) ...
Verónika Peralta, Raul Ruggia
ISTA
2004
13 years 11 months ago
Evidential Paradigm and Intelligent Mathematical Text Processing
Abstract: This paper presents the evidential paradigm of computer-supported mathematical assistance in "doing" mathematics and in reasoning activity. At present, the evid...
Alexander V. Lyaletski, Anatoly E. Doroshenko, And...
EACL
2003
ACL Anthology
13 years 11 months ago
AVM Description Compilation using Types as Modes
This paper provides a method for generating compact and efficient code to implement the enforcement of a description in typed feature logic. It does so by viewing information abo...
Gerald Penn
EUSFLAT
2003
161views Fuzzy Logic» more  EUSFLAT 2003»
13 years 11 months ago
Fuzzy interpolation and level 2 gradual rules
Functional laws may be known only at a finite number of points, and then the function can be completed by interpolation techniques obeying some smoothness conditions. We rather pr...
Sylvie Galichet, Didier Dubois, Henri Prade