Sciweavers

185 search results - page 21 / 37
» A Case-Based Answer to Some Problems of Knowledge-Based Syst...
Sort
View
81
Voted
FCT
2005
Springer
15 years 3 months ago
Leftist Grammars and the Chomsky Hierarchy
Leftist grammars can be characterized in terms of rules of the form a → ba and cd → d, without distinction between terminals and nonterminals. They were introduced by Motwani e...
Tomasz Jurdzinski, Krzysztof Lorys
87
Voted
DSN
2003
IEEE
15 years 2 months ago
Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case Study
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the depe...
Lorenzo Strigini, Andrey Povyakalo, Eugenio Alberd...
CCS
1997
ACM
15 years 1 months ago
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack
In this paper, we address the following problem: \ Is it possible to weaken/attack a scheme when a (provably) secure cryptosystem is used? ". The answer is yes. We exploit we...
Marc Joye, Jean-Jacques Quisquater
SADFE
2005
IEEE
15 years 3 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
IJAR
2010
153views more  IJAR 2010»
14 years 8 months ago
Diagnosis of dyslexia with low quality data with genetic fuzzy systems
For diagnosing dyslexia in early childhood, children have to solve non-writing based, graphical tests. Curently, these tests are processed by a human expert; applying artificial ...
Ana M. Palacios, Luciano Sánchez, Iné...