Sciweavers

1268 search results - page 72 / 254
» One Logic to Use Them All
Sort
View
83
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Firewall fingerprinting
—Firewalls are critical security devices handling all traffic in and out of a network. Firewalls, like other software and hardware network devices, have vulnerabilities, which c...
Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex ...
120
Voted
ATAL
2005
Springer
15 years 6 months ago
Knowledge and social laws
In this paper we combine existing work in the area of social laws with a framework for reasoning about knowledge in multi-agent systems. The unifying framework in which this is do...
Wiebe van der Hoek, Mark Roberts, Michael Wooldrid...
93
Voted
SEMWEB
2009
Springer
15 years 7 months ago
A Case Study in Integrating Multiple E-commerce Standards via Semantic Web Technology
Abstract. Internet business-to-business transactions present great challenges in merging information from different sources. In this paper we describe a project to integrate four ...
Yang Yu, Donald Hillman, Basuki Setio, Jeff Heflin
133
Voted
CASES
2010
ACM
14 years 10 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
92
Voted
ICTAC
2007
Springer
15 years 7 months ago
On the Expressive Power of QLTL
LTL cannot express the whole class of ω-regular languages and several extensions have been proposed. Among them, Quantified propositional Linear Temporal Logic (QLTL), proposed b...
Zhilin Wu