Sciweavers

2055 search results - page 146 / 411
» Generic Model Refactorings
Sort
View
WETICE
2006
IEEE
15 years 8 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
CAV
1998
Springer
100views Hardware» more  CAV 1998»
15 years 6 months ago
Mechanising BAN Kerberos by the Inductive Method
The version of Kerberos presented by Burrows et al. [5] is fully mechanised using the Inductive Method. Two models are presented, allowing respectively the leak of any session keys...
Giampaolo Bella, Lawrence C. Paulson
COLING
2008
15 years 3 months ago
Robust Similarity Measures for Named Entities Matching
Matching coreferent named entities without prior knowledge requires good similarity measures. Soft-TFIDF is a fine-grained measure which performs well in this task. We propose to ...
Erwan Moreau, François Yvon, Olivier Capp&e...
JCC
2008
91views more  JCC 2008»
15 years 1 months ago
An improved pairwise decomposable finite-difference Poisson-Boltzmann method for computational protein design
Abstract: Our goal is to develop accurate electrostatic models that can be implemented in current computational protein design protocols. To this end, we improve upon a previously ...
Christina L. Vizcarra, Naigong Zhang, Shannon A. M...
JLP
2006
66views more  JLP 2006»
15 years 1 months ago
Petri net modules in the transformation-based component framework
Component-based software engineering needs to be backed by thorough formal concepts and modeling techniques. This paper combines two concepts introduced independently by the two a...
Julia Padberg, Hartmut Ehrig