Sciweavers

5255 search results - page 286 / 1051
» Formal Methods for Privacy
Sort
View
BCSHCI
2008
15 years 6 months ago
Research methods for HCI
The aim of the tutorial is to help researchers, particularly early career researchers, to develop the appropriate skills to make a useful research contribution to Human-Computer I...
Anna Louise Cox, Paul A. Cairns, Harold W. Thimble...
CLA
2004
15 years 5 months ago
A Semi-automatic Method to Ontology Design by Using FCA
Ontology design is a complex and time-consuming process. It is extremely difficult for human experts to discover ontology from given data or texts. This paper presents a semi-autom...
Hele-Mai Haav
ICDIM
2007
IEEE
15 years 10 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
ISW
2001
Springer
15 years 9 months ago
Suitability of a Classical Analysis Method for E-commerce Protocols
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Sigrid Gürgens, Javier Lopez
ENTCS
2006
137views more  ENTCS 2006»
15 years 4 months ago
An Efficient Method for Computing Exact State Space of Petri Nets With Stopwatches
In this paper, we address the issue of the formal verification of real-time systems in the context of a preemptive scheduling policy. We propose an algorithm which computes the st...
Morgan Magnin, Didier Lime, Olivier H. Roux