Sciweavers

1428 search results - page 118 / 286
» aims 2010
Sort
View
ENTCS
2007
110views more  ENTCS 2007»
15 years 4 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
ENTCS
2007
100views more  ENTCS 2007»
15 years 4 months ago
Using Template Haskell for Abstract Interpretation
mplate Haskell for Abstract Interpretation Clara Segura1 ,2 Departamento de Sistemas Inform´aticos y Programaci´on Universidad Complutense de Madrid Madrid, Spain Carmen Torrano3...
Clara Segura, Carmen Torrano
ENTCS
2007
114views more  ENTCS 2007»
15 years 4 months ago
A Graph Abstract Machine Describing Event Structure Composition
Abstract Machine Describing Event Structure Composition Claudia Faggian and Mauro Piccolo 1 ,2 ,3 Dipartimento di Matematica Pura e Applicata – PPS Universit´a di Padova – Par...
Claudia Faggian, Mauro Piccolo
ENTCS
2007
128views more  ENTCS 2007»
15 years 4 months ago
Optimisation Validation
We introduce the idea of optimisation validation, which is to formally establish that an instance of an optimising transformation indeed improves with respect to some resource mea...
David Aspinall, Lennart Beringer, Alberto Momiglia...
ENTCS
2007
89views more  ENTCS 2007»
15 years 4 months ago
Weak Probabilistic Anonymity
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Yuxin Deng, Catuscia Palamidessi, Jun Pang