Sciweavers

9370 search results - page 151 / 1874
» An Abstract Notion of Application
Sort
View
ESORICS
2010
Springer
15 years 2 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
93
Voted
AO
2008
81views more  AO 2008»
15 years 1 months ago
Institutionalising ontology-based semantic integration
Abstract. We address what is still a scarcity of general mathematical foundations for ontology-based semantic integration underlying current knowledge engineering methodologies in ...
W. Marco Schorlemmer, Yannis Kalfoglou
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 1 months ago
On the Stability of Empirical Risk Minimization in the Presence of Multiple Risk Minimizers
Abstract--Recently Kutin and Niyogi investigated several notions of algorithmic stability--a property of a learning map conceptually similar to continuity--showing that training-st...
Benjamin I. P. Rubinstein, Aleksandr Simma
115
Voted
CORR
2010
Springer
122views Education» more  CORR 2010»
15 years 1 months ago
Specifying Reusable Components
Reusable software components need well-defined interfaces, rigorously and completely documented features, and a design amenable both to reuse and to formal verification; all these...
Nadia Polikarpova, Carlo A. Furia, Bertrand Meyer
DATAMINE
2008
89views more  DATAMINE 2008»
15 years 1 months ago
Mining conjunctive sequential patterns
Abstract. In this paper we aim at extending the non-derivable condensed representation in frequent itemset mining to sequential pattern mining. We start by showing a negative examp...
Chedy Raïssi, Toon Calders, Pascal Poncelet