Sciweavers

113 search results - page 20 / 23
» Revision of DL-Lite Knowledge Bases
Sort
View
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 8 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
JAIR
2010
145views more  JAIR 2010»
13 years 5 months ago
On Action Theory Change
As historically acknowledged in the Reasoning about Actions and Change community, intuitiveness of a logical domain description cannot be fully automated. Moreover, like any other...
Ivan José Varzinczak
WCRE
2003
IEEE
14 years 19 days ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte
CP
1995
Springer
13 years 11 months ago
Asynchronous Weak-commitment Search for Solving Distributed Constraint Satisfaction Problems
A distributed constraint satisfaction problem (Distributed CSP) is a CSP in which variables and constraints are distributed among multiple automated agents, and various application...
Makoto Yokoo
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
13 years 10 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...