Sciweavers

950 search results - page 58 / 190
» Pin-pointing concept descriptions
Sort
View
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
15 years 8 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith
SAC
2010
ACM
15 years 11 months ago
Towards the induction of terminological decision trees
A concept learning framework for terminological representations is introduced. It is grounded on a method for inducing logic decision trees as an adaptation of the classic tree in...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
ICECCS
2008
IEEE
203views Hardware» more  ICECCS 2008»
15 years 11 months ago
Using AADL to Model a Protocol Stack
In recent trends, the Architecture Analysis and Design Language (AADL) has received increasing attention from safety-critical software development industries. Specific about the A...
Didier Delanote, Stefan Van Baelen, Wouter Joosen,...
ESWS
2011
Springer
14 years 8 months ago
DataFinland - A Semantic Portal for Open and Linked Datasets
The number of open datasets available on the web is increasing rapidly with the rise of the Linked Open Data (LOD) cloud and various governmental efforts for releasing public data ...
Matias Frosterus, Eero Hyvönen, Joonas Laitio
FUIN
2007
84views more  FUIN 2007»
15 years 4 months ago
Observation Based System Security
A formal model for description of passive and active timing attacks is presented, studied and compared with other security concepts. It is based on a timed process algebra and on a...
Damas P. Gruska