Sciweavers

2602 search results - page 411 / 521
» Semantic Analysis of 'to'
Sort
View
IWFM
2003
13 years 11 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
ANLP
1997
115views more  ANLP 1997»
13 years 11 months ago
An Automatic Scoring System For Advanced Placement Biology Essays
This paper describes a prceXype for automatically scoring College Board Advanced Placement (AP) Biology essays.I. The scoring technique used in this study was based on a previous ...
Jill Burstein, Susanne Wolff, Chi Lu, Randy M. Kap...
CSL
2010
Springer
13 years 11 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
ADBIS
2010
Springer
173views Database» more  ADBIS 2010»
13 years 10 months ago
Applying the UFO Ontology to Design an Agent-Oriented Engineering Language
The problem of designing suitable conceptual modeling languages for system engineering is far from being solved. In the past years, some works have proposed the use of foundational...
Renata S. S. Guizzardi, Giancarlo Guizzardi
SIGCOMM
2010
ACM
13 years 10 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker