Sciweavers

3993 search results - page 540 / 799
» Matchmaking for Structured Objects
Sort
View
IJNSEC
2008
108views more  IJNSEC 2008»
15 years 4 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
JAR
2008
89views more  JAR 2008»
15 years 4 months ago
An Extensible Encoding of Object-oriented Data Models in hol
Abstract We present an extensible encoding of object-oriented data models into higherorder logic (HOL). Our encoding is supported by a datatype package that leverages the use of th...
Achim D. Brucker, Burkhart Wolff
JCP
2008
144views more  JCP 2008»
15 years 4 months ago
Discourse Analysis of Public Debates Using Corpus Linguistic Methodologies
The aim of this study is to develop a computational method of discourse analysis based on corpus semantics. The objective is to achieve an accurate understanding of the debate cont...
Hayeong Jeong, Shun Shiramatsu, Kiyoshi Kobayashi,...
JOT
2008
144views more  JOT 2008»
15 years 4 months ago
JAPROSIM: A Java framework for Process Interaction Discrete Event Simulation
In this paper, we discuss various aspects of the design, implementation, and use of JAPROSIM which is a general purpose discrete event simulation framework based on the Java progr...
Bourouis Abdelhabib, Belattar Brahim
KES
2008
Springer
15 years 4 months ago
Application Study in Decision Support with Fuzzy Cognitive Map
Fuzzy cognitive map is an approach to knowledge representation and inference; it emphasizes the connections of concepts as basic units for storing knowledge, and the structure that...
Yue He