Sciweavers

6527 search results - page 180 / 1306
» On Typing Information Flow
Sort
View
IFIP
2005
Springer
14 years 2 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
HAIS
2009
Springer
14 years 1 months ago
Pareto-Based Multi-output Model Type Selection
In engineering design the use of approximation models (= surrogate models) has become standard practice for design space exploration, sensitivity analysis, visualization and optimi...
Dirk Gorissen, Ivo Couckuyt, Karel Crombecq, Tom D...
LREC
2010
119views Education» more  LREC 2010»
13 years 10 months ago
Predicting Morphological Types of Chinese Bi-Character Words by Machine Learning Approaches
This paper presented an overview of Chinese bi-character words' morphological types, and proposed a set of features for machine learning approaches to predict these types bas...
Ting-Hao Huang, Lun-Wei Ku, Hsin-Hsi Chen
ISICT
2004
13 years 10 months ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang
IWPC
2006
IEEE
14 years 3 months ago
Classifying Change Types for Qualifying Change Couplings
Current change history analysis approaches rely on information provided by versioning systems such as CVS. Therefore, changes are not related to particular source code entities su...
Beat Fluri, Harald Gall