Sciweavers

2043 search results - page 333 / 409
» Reasoning About Security Models
Sort
View
SIGSOFT
2004
ACM
14 years 4 months ago
Engineering human trust in mobile system collaborations
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Licia Capra
RULEML
2004
Springer
14 years 4 months ago
R-DEVICE: A Deductive RDF Rule Language
In this paper we present R-DEVICE, a deductive rule language for reasoning about RDF metadata. R-DEVICE includes features such as normal and generalized path expressions, stratifie...
Nick Bassiliades, Ioannis P. Vlahavas
EUROCRYPT
1999
Springer
14 years 3 months ago
A Note on the Limits of Collusion-Resistant Watermarks
In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D1 , D2 , . . . to each buyer; if a buyer posts his/her document Di to the...
Funda Ergün, Joe Kilian, Ravi Kumar
KBSE
1998
IEEE
14 years 3 months ago
Planning Equational Verification in CCS
Most efforts to automate formal verification of communicating systems have centred around finite-state systems (FSSs). However, FSSs are incapable of modelling many practical comm...
Raul Monroy, Alan Bundy, Ian Green
COSIT
1997
Springer
115views GIS» more  COSIT 1997»
14 years 3 months ago
Qualitative Representation of Change
Current geographic information systems (GISs) have been designed for querying and maintaining static databases representing static phenomena and give little support to those users ...
Kathleen Hornsby, Max J. Egenhofer