Sciweavers

1414 search results - page 112 / 283
» Combining Intruder Theories
Sort
View
87
Voted
GPCE
2007
Springer
15 years 7 months ago
Oz/K: a kernel language for component-based open programming
Programming in an open environment remains challenging because it requires combining modularity, security, concurrency, distribution, and dynamicity. In this paper, we propose an ...
Michael Lienhardt, Alan Schmitt, Jean-Bernard Stef...
102
Voted
POLICY
2007
Springer
15 years 6 months ago
A Socio-cognitive Approach to Modeling Policies in Open Environments
The richness of today’s electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current intera...
Tatyana Ryutov
98
Voted
PPDP
2007
Springer
15 years 6 months ago
A simple rewrite notion for call-time choice semantics
Non-confluent and non-terminating rewrite systems are interesting from the point of view of programming. In particular, existing functional logic languages use such kind of rewri...
Francisco Javier López-Fraguas, Juan Rodr&i...
CCECE
2006
IEEE
15 years 6 months ago
Regularized Fractal Image Decoding
The goal of this paper is to present a new recipe for the fractal image decoding process. In this paper, we explain how fractal-based methods can be internally combined with regul...
Mehran Ebrahimi, Edward R. Vrscay
83
Voted
HICSS
2006
IEEE
189views Biometrics» more  HICSS 2006»
15 years 6 months ago
Barriers to Information Access across Languages on the Internet: Network and Language Effects
This paper investigates the role of language in accessing information on the Internet. We combined data about website visitors through log-file analysis with data about web-hosts ...
Anett Kralisch, Thomas Mandl