Sciweavers

511 search results - page 80 / 103
» Composition of Semantic Relations: Model and Applications
Sort
View
JODS
2007
138views Data Mining» more  JODS 2007»
14 years 11 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
CSL
2000
Springer
15 years 4 months ago
Subtyping with Power Types
This paper introduces a typed λ-calculus called λPower , a predicative reformulation of part of Cardelli’s power type system. Power types integrate subtyping into the typing t...
David Aspinall
EMSOFT
2007
Springer
15 years 6 months ago
The algebra of connectors: structuring interaction in BIP
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a component-based system. A connector relates a set of typed ports. Types a...
Simon Bliudze, Joseph Sifakis
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
GIS
2010
ACM
14 years 10 months ago
Finding similar users using category-based location history
In this paper, we aim to estimate the similarity between users according to their GPS trajectories. Our approach first models a user’s GPS trajectories with a semantic location ...
Xiangye Xiao, Yu Zheng, Qiong Luo, Xing Xie