Sciweavers

15375 search results - page 271 / 3075
» cans 2008
Sort
View
IGPL
2008
93views more  IGPL 2008»
13 years 8 months ago
Cut-Based Abduction
In this paper we explore a generalization of traditional abduction which can simultaneously perform two different tasks: (i) given an unprovable sequent G, find a sentence H such ...
Marcello D'Agostino, Marcelo Finger, Dov M. Gabbay
IJACT
2008
101views more  IJACT 2008»
13 years 8 months ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
IJAR
2008
119views more  IJAR 2008»
13 years 8 months ago
Adapting Bayes network structures to non-stationary domains
When an incremental structural learning method gradually modifies a Bayesian network (BN) structure to fit observations, as they are read from a database, we call the process stru...
Søren Holbech Nielsen, Thomas D. Nielsen
IJAR
2008
98views more  IJAR 2008»
13 years 8 months ago
Fuzzy region connection calculus: Representing vague topological information
Qualitative spatial information plays a key role in many applications. While it is well-recognized that all but a few of these applications deal with spatial information that is a...
Steven Schockaert, Martine De Cock, Chris Cornelis...
IJCSA
2008
131views more  IJCSA 2008»
13 years 8 months ago
On Ubiquitous Integrated Computing
: Ubiquitous integrated computing makes possible new workflow processes and business models which can meet the challenges from the fast growing digital convergence. An integrated i...
Kari Anne Haaland Thorsen, Chunming Rong