Sciweavers

204 search results - page 15 / 41
» Probabilistic Attributed Hashing
Sort
View
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 2 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
VLDB
1990
ACM
116views Database» more  VLDB 1990»
14 years 18 days ago
A Probabilistic Framework for Vague Queries and Imprecise Information in Databases
A probabilistic learning model for vague queries and missing or imprecise information in databases is described. Instead of retrieving only a set of answers, our approach yields a...
Norbert Fuhr
IFM
2010
Springer
133views Formal Methods» more  IFM 2010»
13 years 6 months ago
Towards Probabilistic Modelling in Event-B
Abstract. Event-B provides us with a powerful framework for correctby-construction system development. However, while developing dependable systems we should not only guarantee the...
Anton Tarasyuk, Elena Troubitsyna, Linas Laibinis
JMLR
2010
95views more  JMLR 2010»
13 years 3 months ago
Feature Extraction for Machine Learning: Logic-Probabilistic Approach
The paper analyzes peculiarities of preprocessing of learning data represented in object data bases constituted by multiple relational tables with ontology on top of it. Exactly s...
Vladimir Gorodetsky, Vladimir Samoilov
CCGRID
2004
IEEE
14 years 10 days ago
Adaptive congestion control for hotspot management in structured peer-to-peer systems
Distributed Hash Tables (DHTs) bring the promise of increased availability of data to wide-area systems, under the assumption of uniform request load. However, they don't int...
Anne-Marie Bosneag, Yong Xi, Xinjie Li, Monica Bro...