Sciweavers

915 search results - page 130 / 183
» Proof labeling schemes
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
CPU Bugs, CPU Backdoors and Consequences on Security
In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
Loïc Duflot
ACL
1993
13 years 9 months ago
A Complete and Recursive Feature Theory
Various feature descriptions are being employed in constrained-based grammar formalisms. The common notational primitive of these descriptions are functional attributes called fea...
Rolf Backofen, Gert Smolka
AI
2007
Springer
13 years 8 months ago
Subjective logic and arguing with evidence
This paper introduces a Subjective Logic based argumentation framework primarily targeted at evidential reasoning. The framework explicitly caters for argument schemes, accrual of...
Nir Oren, Timothy J. Norman, Alun D. Preece
IJSYSC
2006
127views more  IJSYSC 2006»
13 years 8 months ago
Backlash compensation of nonlinear systems using fuzzy logic
: A backlash compensator is designed for nonlinear systems using the fuzzy logic. The classification property of fuzzy logic systems makes them a natural candidate for the rejectio...
Jun Oh Jang, Gi Joon Jeon
IJNSEC
2007
154views more  IJNSEC 2007»
13 years 8 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski