Sciweavers

99 search results - page 16 / 20
» Objective Bayesianism with predicate languages
Sort
View
KBSE
2010
IEEE
13 years 6 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes
MMMACNS
2001
Springer
14 years 1 days ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
CICLING
2004
Springer
14 years 1 months ago
Hierarchies Measuring Qualitative Variables
Qualitative variables take symbolic values, such as hot, shoe, Europe or France. Sometimes, the values may be arranged in layers or levels of detail. For instance, the variable pla...
Serguei Levachkine, Adolfo Guzmán-Arenas
ICALP
2001
Springer
14 years 3 days ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
ADBIS
2006
Springer
135views Database» more  ADBIS 2006»
13 years 11 months ago
Interactive Discovery and Composition of Complex Web Services
Among the most important expected benefits of a global service oriented architecture leveraging web service standards is an increased level of automation in the discovery, composit...
Sergey A. Stupnikov, Leonid A. Kalinichenko, St&ea...