Sciweavers

19130 search results - page 3397 / 3826
» Modelling multi-path problems
Sort
View
EUC
2008
Springer
15 years 6 months ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie
EUROGP
2008
Springer
15 years 6 months ago
PlasmidPL: A Plasmid-Inspired Language for Genetic Programming
We present PlasmidPL, a plasmid-inspired programming language designed for Genetic Programming (GP), and based on a chemical metaphor. The basic data structures in PlasmidPL are ci...
Lidia Yamamoto
IESA
2007
15 years 6 months ago
Formalizing the OPAL eBusiness ontology design patterns with OWL
Domain ontology building is one of the most critical activities required in Semantic Web applications. The task must be performed by domain experts, who do not (generally) have the...
Fulvio D'Antonio, Michele Missikoff, Francesco Tag...
ACISP
2010
Springer
15 years 6 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila
FOIKS
2008
Springer
15 years 6 months ago
Algorithms for Effective Argumentation in Classical Propositional Logic: A Connection Graph Approach
There are a number of frameworks for modelling argumentation in logic. They incorporate a formal representation of individual arguments and techniques for comparing conflicting arg...
Vasiliki Efstathiou, Anthony Hunter
« Prev « First page 3397 / 3826 Last » Next »