Sciweavers

255 search results - page 16 / 51
» Generalizing Consistency and other Constraint Properties to ...
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 10 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
RE
2009
Springer
15 years 4 months ago
Intellectual Property Rights Requirements for Heterogeneously-Licensed Systems
Heterogeneously-licensed systems pose new challenges to analysts and system architects. Appropriate intellectual property rights must be available for the installed system, but wi...
Thomas A. Alspaugh, Hazeline U. Asuncion, Walt Sca...
AI
2010
Springer
14 years 10 months ago
Implementing logical connectives in constraint programming
Combining constraints using logical connectives such as disjunction is ubiquitous in constraint programming, because it adds considerable expressive power to a constraint language...
Christopher Jefferson, Neil C. A. Moore, Peter Nig...
88
Voted
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
15 years 10 months ago
Efficient incremental constrained clustering
Clustering with constraints is an emerging area of data mining research. However, most work assumes that the constraints are given as one large batch. In this paper we explore the...
Ian Davidson, S. S. Ravi, Martin Ester
CP
2004
Springer
15 years 3 months ago
Controllability of Soft Temporal Constraint Problems
In real-life temporal scenarios, uncertainty and preferences are often essential, coexisting aspects. We present a formalism where temporal constraints with both preferences and un...
Francesca Rossi, Kristen Brent Venable, Neil Yorke...