Sciweavers

12459 search results - page 150 / 2492
» cans 2006
Sort
View
RIA
2006
84views more  RIA 2006»
15 years 4 months ago
Learning Recursive Automata from Positive Examples
In this theoretical paper, we compare the "classical" learning techniques used to infer regular grammars from positive examples with the ones used to infer categorial gra...
Isabelle Tellier
IJDE
2007
384views more  IJDE 2007»
15 years 4 months ago
Computer Forensic Analysis in a Virtual Environment
In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and softwa...
Derek Bem, Ewa Huebner
AIM
2005
15 years 4 months ago
Description Logics and Planning
This paper surveys previous work on combining planning techniques with expressive representations of knowledge in description logics to reason about tasks, plans, and goals. Descr...
Yolanda Gil
IJNSEC
2007
122views more  IJNSEC 2007»
15 years 4 months ago
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
Rongxing Lu, Zhenfu Cao
IJNSEC
2007
107views more  IJNSEC 2007»
15 years 4 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu