—Interactive theorem provers based on higher-order logic (HOL) traditionally follow the definitional approach, reducing high-level specifications to logical primitives. This al...
Dmitriy Traytel, Andrei Popescu, Jasmin Christian ...
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
We present the first PAC bounds for learning parameters of Conditional Random Fields [12] with general structures over discrete and real-valued variables. Our bounds apply to com...
Abstract. Development of composed services requires a continues adaptation of the composed service to the changing environment of offered services. Services may no longer be avail...
Abstract. Todays information systems are built using various component models such as Enterprise Java Beans, JavaBeans, Microsoft COM+, and CORBA distributed objects. In this paper...