Sciweavers

1414 search results - page 103 / 283
» Combining Intruder Theories
Sort
View
111
Voted
CSREASAM
2006
15 years 2 months ago
SPS-VN: Research on the Security Policy System for Virtual Network
- In the area of network information security, it is necessary to study the security in the end-to-end communication. This paper proposes a theory of virtual network by end-to-end....
Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefe...
100
Voted
DAGSTUHL
2006
15 years 2 months ago
Binary Lambda Calculus and Combinatory Logic
In the first part, we introduce binary representations of both lambda calculus and combinatory logic terms, and demonstrate their simplicity by providing very compact parser-inter...
John Tromp
ACL
2001
15 years 2 months ago
Resolving Ellipsis in Clarification
We offer a computational analysis of the resolution of ellipsis in certain cases of dialogue clarification. We show that this goes beyond standard techniques used in anaphora and ...
Jonathan Ginzburg, Robin Cooper
83
Voted
WSC
1998
15 years 2 months ago
An Approach to Ranking and Selection for Multiple Performance Measures
In this paper, we develop a ranking and selection procedure for making multiple comparisons of systems that have multiple performance measures. The procedure combines multiple att...
Douglas J. Morrice, John C. Butler, Peter W. Mulla...
96
Voted
APAL
2008
112views more  APAL 2008»
15 years 25 days ago
A domain model characterising strong normalisation
Building on previous work by Coquand and Spiwack [8] we construct a strict domaintheoretic model for the untyped -calculus with pattern matching and term rewriting which has the p...
Ulrich Berger