Sciweavers

27827 search results - page 5051 / 5566
» Generating
Sort
View
CAEPIA
2005
Springer
15 years 10 months ago
Mapping Conformant Planning into SAT Through Compilation and Projection
Conformant planning is a variation of classical AI planning where the initial state is partially known and actions can have nondeterministic effects. While a classical plan must a...
Héctor Palacios, Hector Geffner
CAISE
2005
Springer
15 years 10 months ago
A Meta Model for Process Mining Data
Abstract. Modern process-aware information systems store detailed information about processes as they are being executed. This kind of information can be used for very different p...
Boudewijn F. van Dongen, Wil M. P. van der Aalst
CCS
2005
ACM
15 years 10 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
CCS
2005
ACM
15 years 10 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
CICLING
2005
Springer
15 years 10 months ago
The UNL Initiative: An Overview
We are presenting a description of the UNL initiative based on the Universal Networking Language (UNL). This language was conceived to be the support of the multilingual communicat...
Igor Boguslavsky, Jesús Cardeñosa, C...
« Prev « First page 5051 / 5566 Last » Next »