Sciweavers

1493 search results - page 248 / 299
» Learning Concepts by Modeling Relationships
Sort
View
CSL
2010
Springer
15 years 28 days ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
FSS
2008
127views more  FSS 2008»
14 years 12 months ago
On the computing power of fuzzy Turing machines
We work with fuzzy Turing machines (FTMs) and we study the relationship between this computational model and classical recursion concepts such as computable functions, recursively...
Benjamín René Callejas Bedregal, San...
CAD
1999
Springer
14 years 11 months ago
Set-combinations of the mixed-dimension cellular objects of the Djinn API
This paper is concerned with the mathematics and formal specification of "set-like" operations for the mixed dimension cellular objects of the Djinn Application Programm...
Alan E. Middleditch, Chris Reade, Abel J. P. Gomes
TKDE
2010
210views more  TKDE 2010»
14 years 10 months ago
Structural and Role-Oriented Web Service Discovery with Taxonomies in OWL-S
—In this paper, we describe and evaluate a Web service discovery framework using OWL-S advertisements, combined with the distinction between service and Web service of the WSMO D...
Georgios Meditskos, Nick Bassiliades
SCN
2010
Springer
163views Communications» more  SCN 2010»
14 years 9 months ago
Time-Specific Encryption
This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Inst...
Kenneth G. Paterson, Elizabeth A. Quaglia