Sciweavers

1635 search results - page 164 / 327
» Reasoning from Data Rather than Theory
Sort
View
ASIACRYPT
2009
Springer
14 years 17 days ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
AAAI
2007
13 years 11 months ago
A Spectrum of Symbolic On-line Diagnosis Approaches
This paper deals with the monitoring and diagnosis of large discrete-event systems. The problem is to determine, online, all faults and states that explain the flow of observatio...
Anika Schumann, Yannick Pencolé, Sylvie Thi...
HCI
2007
13 years 10 months ago
Focussing on Extra-Ordinary Users
“Universal Access” is often focused on modifying main-stream products to respond to the demands of older and disabled people – which implies an extremely wide range of user c...
Graham Pullin, Alan F. Newell
ASWEC
2010
IEEE
13 years 9 months ago
Non-Monotonic Model Completion in Web Application Engineering
—Formal models are often used to verify systems and prove their correctness, and ensure that transformed models remain consistent to the original system. However, formal techniqu...
Jevon M. Wright, Jens Dietrich
SEMWEB
2010
Springer
13 years 3 months ago
Modeling vs encoding for the Semantic Web
The Semantic Web emphasizes encoding over modeling. It is built on the premise that ontology engineers can say something useful about the semantics of vocabularies by expressing th...
Werner Kuhn