Sciweavers

302 search results - page 47 / 61
» An approach to synthesise safe systems
Sort
View
130
Voted
SASO
2007
IEEE
15 years 6 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
79
Voted
FSTTCS
2007
Springer
15 years 6 months ago
Closures and Modules Within Linear Logic Concurrent Constraint Programming
There are two somewhat contradictory ways of looking at modules in a given programming language. On the one hand, module systems are largely independent of the particulars of progr...
Rémy Haemmerlé, François Fage...
100
Voted
CASSIS
2005
Springer
15 years 6 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
98
Voted
LREC
2010
237views Education» more  LREC 2010»
15 years 1 months ago
Flexible Ontology Population from Text: The OwlExporter
Ontology population from text is becoming increasingly important for NLP applications. Ontologies in OWL format provide for a standardized means of modeling, querying, and reasoni...
René Witte, Ninus Khamis, Juergen Rilling
ETS
2000
IEEE
126views Hardware» more  ETS 2000»
15 years 8 days ago
Dynamic Goal-Based Role-Play Simulation on the Web: A Case Study
This paper outlines and discusses the pedagogical approach, the technical design architecture, and an innovative implementation of a collaborative role-play simulation technology ...
Som Naidu, Albert Ip, Roni Linser