Sciweavers

825 search results - page 62 / 165
» Internal Iteration Externalized
Sort
View
CPC
2004
98views more  CPC 2004»
13 years 7 months ago
And/Or Trees Revisited
We consider boolean functions over n variables. Any such function can be represented (and computed) by a complete binary tree with and or or in the internal nodes and a literal in...
Brigitte Chauvin, Philippe Flajolet, Danièl...
FAC
2010
107views more  FAC 2010»
13 years 6 months ago
Algebra and logic for access control
: © Algebra and logic for access control Matthew Collinson, David Pym HP Laboratories HPL-2008-75R1 Access control, process algebra, bunched Logic; systems modelling The access co...
Matthew Collinson, David J. Pym
FC
2010
Springer
145views Cryptology» more  FC 2010»
13 years 6 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
IEEEMM
2010
102views more  IEEEMM 2010»
13 years 6 months ago
Printing in a Digital Age
:  Printing in a Digital Age Qian Lin, Jerry Liu, Daniel Tretter HP Laboratories HPL-2010-113 Paper has been used as an information medium for almost two thousand years. But dur...
Qian Lin, Jerry Liu, Daniel Tretter
IPMU
2010
Springer
13 years 6 months ago
Addressing Complexity in a Privacy Expert System
:  Simple Mode: Addressing Knowledge Engineering Complexity in a Privacy Expert System Siani Pearson HP Laboratories HPL-2010-75 privacy, decision support, usability, knowledge ...
Siani Pearson