Sciweavers

2209 search results - page 271 / 442
» Language Based Secure Communication
Sort
View
143
Voted
ACOM
2006
Springer
15 years 5 months ago
ACL Semantics Between Social Commitments and Mental Attitudes
Abstract. There are two main traditions in defining a semantics for agent communication languages, based either on mental attitudes or on social commitments. In this paper, we tran...
Guido Boella, Rossana Damiano, Joris Hulstijn, Lee...
ITA
2007
118views Communications» more  ITA 2007»
15 years 3 months ago
Uniformly bounded duplication codes
Duplication is the replacement of a factor w within a word by ww. This operation can be used iteratively to generate languages starting from words or sets of words. By undoing dupl...
Peter Leupold, Victor Mitrana
162
Voted
OOPSLA
2007
Springer
15 years 9 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
126
Voted
FGCN
2008
IEEE
173views Communications» more  FGCN 2008»
15 years 10 months ago
Performance Analysis of Hybrid Fingerprint Matching Methods
The fingerprint verification methods include minutiae-based and image-based methods. The minutiae-based method has been frequently used, but it has limitations in performance. Thes...
Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung B...
164
Voted
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 10 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen