Sciweavers

1995 search results - page 282 / 399
» What's the Problem
Sort
View
151
Voted
LICS
1999
IEEE
15 years 8 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
TOOLS
1999
IEEE
15 years 8 months ago
Defining UML Family Members Using Prefaces
The Unified Modeling Language is extensible, and so can be regarded as a family of languages. Implicitly or explicitly, any particular UML model should be accompanied by a definit...
Steve Cook, Anneke Kleppe, Jos Warmer, Richard Mit...
140
Voted
VL
1999
IEEE
134views Visual Languages» more  VL 1999»
15 years 8 months ago
Ambiguity in Visual Language Theory and Its Role in Diagram Parsing
To take advantage of the ever-increasing volume of diagrams in electronic form, it is crucial that we have methods for parsing diagrams. Once a structured, content-based descripti...
Robert P. Futrelle
ACSAC
1998
IEEE
15 years 8 months ago
A Practical Approach to Measuring Assurance
1 Assurance has been defined as "the degree of confidence that security needs are satisfied"[2]. The problem with this definition is that, unless one has a way to specify...
G. F. Jelen, J. R. Williams
ILP
1999
Springer
15 years 8 months ago
Rule Evaluation Measures: A Unifying View
Numerous measures are used for performance evaluation in machine learning. In predictive knowledge discovery, the most frequently used measure is classification accuracy. With new...
Nada Lavrac, Peter A. Flach, Blaz Zupan