Sciweavers

303 search results - page 36 / 61
» Unifying Theories of Confidentiality
Sort
View
CCS
2003
ACM
14 years 3 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
CIKM
2001
Springer
14 years 2 months ago
Merging Techniques for Performing Data Fusion on the Web
Data fusion on the Web refers to the merging, into a unified single list, of the ranked document lists, which are retrieved in response to a user query by more than one Web search...
Theodora Tsikrika, Mounia Lalmas
FM
2001
Springer
130views Formal Methods» more  FM 2001»
14 years 2 months ago
Towards a Topos Theoretic Foundation for the Irish School of Constructive Mathematics
The Irish School of Constructive Mathematics (M♣ c ), which extends the VDM, exploits an algebraic notation based upon monoids and their morphisms for the purposes of abstract mo...
Mícheál Mac an Airchinnigh
IPPS
1999
IEEE
14 years 2 months ago
A Structured Approach to Parallel Programming: Methodology and Models
Parallel programming continues to be difficult, despite substantial and ongoing research aimed at making it tractable. Especially dismaying is the gulf between theory and the pract...
Berna L. Massingill
TAGT
1998
Springer
184views Graph Theory» more  TAGT 1998»
14 years 2 months ago
A Framework for Adding Packages to Graph Transformation Approaches
Graphs are a commonly used formalism for modeling many different kinds of static and dynamic data. In many applications, data modeling can be improved by using hierarchically struc...
Giorgio Busatto, Gregor Engels, Katharina Mehner, ...