Sciweavers

1054 search results - page 176 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 12 days ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
TCS
2010
15 years 9 days ago
Error-repair parsing schemata
Robustness, the ability to analyze any input regardless of its grammaticality, is a desirable property for any system dealing with unrestricted natural language text. Error-repair...
Carlos Gómez-Rodríguez, Miguel A. Al...
ACL
2010
14 years 12 months ago
Bitext Dependency Parsing with Bilingual Subtree Constraints
This paper proposes a dependency parsing method that uses bilingual constraints to improve the accuracy of parsing bilingual texts (bitexts). In our method, a targetside tree frag...
Wenliang Chen, Jun'ichi Kazama, Kentaro Torisawa
ACIVS
2009
Springer
14 years 11 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...
DOLAP
2010
ACM
14 years 11 months ago
Using ontologies to discover fact IDs
Object identification is a crucial step in most information systems. Nowadays, we have many different ways to identify entities such as surrogates, keys and object identifiers. Ho...
Alberto Abelló, Oscar Romero