Sciweavers

6455 search results - page 1194 / 1291
» Research problems
Sort
View
SEMWEB
2007
Springer
14 years 4 months ago
Analyzing Mapping Extraction Approaches
While lots of research in ontology matching is related to the issue of computing and refining similarity measures, only little attention has been paid to question how to extract t...
Christian Meilicke, Heiner Stuckenschmidt
TACAS
2007
Springer
99views Algorithms» more  TACAS 2007»
14 years 4 months ago
"Don't Care" Modeling: A Logical Framework for Developing Predictive System Models
Analysis of biological data often requires an understanding of components of pathways and/or networks and their mutual dependency relationships. Such systems are often analyzed and...
Hillel Kugler, Amir Pnueli, Michael J. Stern, E. J...
TARK
2007
Springer
14 years 4 months ago
Knowledge-based modelling of voting protocols
We contend that reasoning about knowledge is both natural and pragmatic for verification of electronic voting protocols. We present a model in which desirable properties of elect...
A. Baskar, Ramaswamy Ramanujam, S. P. Suresh
TCC
2007
Springer
89views Cryptology» more  TCC 2007»
14 years 4 months ago
On Secret Sharing Schemes, Matroids and Polymatroids
Abstract. One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brick...
Jaume Martí-Farré, Carles Padr&oacut...
ACSC
2006
IEEE
14 years 4 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
« Prev « First page 1194 / 1291 Last » Next »