Sciweavers

5030 search results - page 142 / 1006
» cases 2007
Sort
View
EUSFLAT
2007
138views Fuzzy Logic» more  EUSFLAT 2007»
15 years 6 months ago
On the Reliability of Multistate Systems with Imprecise Probabilities
We consider the computation of multistate systems reliabilities in the presence of random set estimations for the elements' working abilities. It turns out that the Dempster-...
Michael Wagenknecht, Ulrike Gocht
EUSFLAT
2007
15 years 6 months ago
Power Sets and Implication Operators Revisited: A Retrospective Look at the Foundational and Conceptual Issues in Bandler and Ko
In our case study we look at one of the early papers that interrelates the concept of fuzzy set inclusion, power set and many-valued implication operators, namely the paper of Ban...
Ladislav J. Kohout
BNCOD
2006
85views Database» more  BNCOD 2006»
15 years 6 months ago
Trust Obstacle Mitigation for Database Systems
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model...
Victor Page, Robin C. Laney, Maurice Dixon, Charle...
107
Voted
DAGSTUHL
2006
15 years 6 months ago
Constraint Satisfaction with Succinctly Specified Relations
Abstract. The general intractability of the constraint satisfaction problem (CSP) has motivated the study of the complexity of restricted cases of this problem. Thus far, the liter...
Hubie Chen, Martin Grohe
ICISC
2004
120views Cryptology» more  ICISC 2004»
15 years 6 months ago
Algebraic Attacks on Combiners with Memory and Several Outputs
Algebraic attacks on stream ciphers [14] recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based ...
Nicolas Courtois