Sciweavers

373 search results - page 25 / 75
» Trustworthy Information: Concepts and Mechanisms
Sort
View
HIS
2004
13 years 9 months ago
Q'tron Neural Networks for Constraint Satisfaction
This paper proposes the methods to solve the constraint satisfaction problems (CSPs) using Q'tron neural networks (NNs). A Q'tron NN is local-minima free if it is built ...
Tai-Wen Yue, Mei-Ching Chen
ADBIS
1994
Springer
137views Database» more  ADBIS 1994»
13 years 11 months ago
The Low-Level Support and Logging for Flexible Transactions
In this paper the ways of various types of transaction support in the buffer system of the storage system are considered. Support of active transaction tree as the mechanism for n...
Henrietta Dombrowska
JUCS
2006
91views more  JUCS 2006»
13 years 7 months ago
Creation and Evaluation of Fuzzy Knowledge-base
: In this paper we give a possible model for handling uncertain information. The concept of fuzzy knowledge-base will be defined as a quadruple of any background knowledge, defined...
Ágnes Achs
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
ETRICS
2006
13 years 11 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme