Sciweavers

2055 search results - page 146 / 411
» Generic Model Refactorings
Sort
View
118
Voted
WETICE
2006
IEEE
15 years 9 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
119
Voted
CAV
1998
Springer
100views Hardware» more  CAV 1998»
15 years 7 months ago
Mechanising BAN Kerberos by the Inductive Method
The version of Kerberos presented by Burrows et al. [5] is fully mechanised using the Inductive Method. Two models are presented, allowing respectively the leak of any session keys...
Giampaolo Bella, Lawrence C. Paulson
75
Voted
COLING
2008
15 years 5 months ago
Robust Similarity Measures for Named Entities Matching
Matching coreferent named entities without prior knowledge requires good similarity measures. Soft-TFIDF is a fine-grained measure which performs well in this task. We propose to ...
Erwan Moreau, François Yvon, Olivier Capp&e...
JCC
2008
91views more  JCC 2008»
15 years 3 months ago
An improved pairwise decomposable finite-difference Poisson-Boltzmann method for computational protein design
Abstract: Our goal is to develop accurate electrostatic models that can be implemented in current computational protein design protocols. To this end, we improve upon a previously ...
Christina L. Vizcarra, Naigong Zhang, Shannon A. M...
136
Voted
JLP
2006
66views more  JLP 2006»
15 years 3 months ago
Petri net modules in the transformation-based component framework
Component-based software engineering needs to be backed by thorough formal concepts and modeling techniques. This paper combines two concepts introduced independently by the two a...
Julia Padberg, Hartmut Ehrig