Sciweavers

3066 search results - page 400 / 614
» On Facilitating Automated Evaluation
Sort
View
ILP
2005
Springer
14 years 1 months ago
A Framework for Set-Oriented Computation in Inductive Logic Programming and Its Application in Generalizing Inverse Entailment
We propose a new approach to Inductive Logic Programming that systematically exploits caching and offers a number of advantages over current systems. It avoids redundant computati...
Héctor Corrada Bravo, David Page, Raghu Ram...
ISPEC
2005
Springer
14 years 1 months ago
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience
: Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to pro...
Stephan Riebach, Erwin P. Rathgeb, Birger Töd...
LPAR
2005
Springer
14 years 1 months ago
Incremental Integrity Checking: Limitations and Possibilities
Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be...
Henning Christiansen, Davide Martinenghi
LPAR
2005
Springer
14 years 1 months ago
Functional Correctness Proofs of Encryption Algorithms
Abstract. We discuss a collection of mechanized formal proofs of symmetric key block encryption algorithms (AES, MARS, Twofish, RC6, Serpent, IDEA, and TEA), performed in an imple...
Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, K...
MATA
2005
Springer
170views Communications» more  MATA 2005»
14 years 1 months ago
Adaptive Content for the Mobile User: A Policy-Based Approach
Service adaptation is fundamental to context-aware service provisioning and to the realization of the Virtual Home Environment concept, which is now an integral part of the 3G serv...
Alvin Yew, Antonio Liotta, Kun Yang