Sciweavers

15375 search results - page 58 / 3075
» cans 2008
Sort
View
JSW
2008
118views more  JSW 2008»
13 years 7 months ago
Deciding the Correctness of Attacks on Authentication Protocols
A new tool for automated validation of attacks on authentication protocols has been used to find several errors and ambiguities in the list of attacks described in the well known r...
Anders Moen Hagalisletto
IUSED
2008
13 years 9 months ago
Reducing Risk through Human Centred Design
The National Academy of Science's report on Human-System Integration in the system development process (NAS HSI report) [12] explains how human needs can be integrated into s...
Nigel Bevan
COLING
1994
13 years 9 months ago
Adjuncts and the Processing of Lexical Rules
The standard HPSG analysis of Germanic verb clusters can not explain the observed narrowscope readings of adjuncts in such verb clusters. We present an extension of the HPSG analy...
Gertjan van Noord, Gosse Bouma
COLING
1996
13 years 9 months ago
Coordination in Tree Adjoining Grammars: Formalization and Implementation
In this paper we show that an account for coordination can be constructed usingthederivationstructures inalexicalized Tree Adjoining Grammar (LTAG). We present a notion of derivat...
Anoop Sarkar, Aravind K. Joshi
COLING
1990
13 years 9 months ago
The Generation Of High-Level Structure For Extended Explanations
2 This paper analyzes the structural features of naturally-occurring extended explanations and argues that current generation methodologies are inadequate for determining high-leve...
David J. Mooney, Sandra Carberry, Kathleen F. McCo...