Sciweavers

3713 search results - page 99 / 743
» Quantum Information Theory
Sort
View
IDA
2010
Springer
13 years 7 months ago
Three alternative combinatorial formulations of the theory of evidence
In this paper we introduce three alternative combinatorial formulations of the theory of evidence (ToE), by proving that both plausibility and commonality functions share the stru...
Fabio Cuzzolin
UTP
2010
13 years 6 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
SSS
2009
Springer
143views Control Systems» more  SSS 2009»
14 years 3 months ago
Self Adaptive High Interaction Honeypots Driven by Game Theory
High-interaction honeypots are relevant to provide rich and useful information obtained from attackers. Honeypots come in different flavors with respect to their interaction pote...
Gérard Wagener, Radu State, Alexandre Dulau...
BCSHCI
2007
13 years 10 months ago
Habitats: a simple way to bridge artifacts, professions, and theories in ubiquitous design
This paper briefly shows how product designers as well as information system designers may use the habitat framework as a tool to inform their understanding of the pervasive compu...
Martin Brynskov, Gunnar Kramp
SIMULATION
1998
83views more  SIMULATION 1998»
13 years 8 months ago
Libraries of Reusable Models: Theory and Application
Setting up a simulation model is more than writing down state equations and running them on a computer. A lot of conceptual information about the physics and engineering aspects o...
Arno Breunese, Jan L. Top, Jan F. Broenink, J. M. ...