Sciweavers

4340 search results - page 861 / 868
» Formal Methods and Cryptography
Sort
View
105
Voted
AI
1998
Springer
14 years 11 months ago
Reasoning About Actions: Steady Versus Stabilizing State Constraints
In formal approaches to commonsense reasoning about actions. the Ramification Problem denotes the problem of handling indirect effects which implicitly derive from so-called state...
Michael Thielscher
CORR
1999
Springer
164views Education» more  CORR 1999»
14 years 11 months ago
Annotation graphs as a framework for multidimensional linguistic data analysis
In recent work we have presented a formal framework for linguistic annotation based on labeled acyclic digraphs. These `annotation graphs' oer a simple yet powerful method fo...
Steven Bird, Mark Liberman
JUCS
2002
231views more  JUCS 2002»
14 years 11 months ago
Efficient Content-Based and Metadata Retrieval in Image Database
: Managing image data in a database system using metadata has been practiced since the last two decades. However, describing an image fully and adequately with metadata is practica...
Solomon Atnafu, Richard Chbeir, Lionel Brunie
105
Voted
TC
1998
14 years 11 months ago
Abstraction Techniques for Validation Coverage Analysis and Test Generation
ion Techniques for Validation Coverage Analysis and Test Generation Dinos Moundanos, Jacob A. Abraham, Fellow, IEEE, and Yatin V. Hoskote —The enormous state spaces which must be...
Dinos Moundanos, Jacob A. Abraham, Yatin Vasant Ho...
TCS
2002
14 years 11 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer