Sciweavers

3653 search results - page 138 / 731
» On Recognizable Timed Languages
Sort
View
CSFW
2003
IEEE
15 years 3 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann
GECCO
2003
Springer
100views Optimization» more  GECCO 2003»
15 years 3 months ago
Studying the Advantages of a Messy Evolutionary Algorithm for Natural Language Tagging
The process of labeling each word in a sentence with one of its lexical categories (noun, verb, etc) is called tagging and is a key step in parsing and many other language processi...
Lourdes Araujo
ASIACRYPT
2006
Springer
15 years 1 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
EDBTW
2006
Springer
15 years 1 months ago
Towards Similarity-Based Topological Query Languages
Abstract. In recent times, the proliferation of spatial data on the Internet is beginning to allow a much larger audience to access and share data currently available in various Ge...
Alberto Belussi, Omar Boucelma, Barbara Catania, Y...
AGP
1995
IEEE
15 years 1 months ago
Constraint Systems for Pattern Analysis of Constraint Logic-Based Languages
Pattern analysis consists in determining the shape of the set of solutions of the constraint store at some program points. Our basic claim is that pattern analyses can all be desc...
Roberto Bagnara