Sciweavers

2702 search results - page 102 / 541
» Practically Applicable Formal Methods
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
15 years 10 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
CISS
2007
IEEE
15 years 4 months ago
Analog Coding for Delay-Limited Applications
— In this paper, we consider the problem of sending an analog source over an additive white Gaussian noise channel. The traditional analog coding schemes suffer from the threshol...
Mahmoud Taherzadeh, Amir K. Khandani
DEXA
2006
Springer
193views Database» more  DEXA 2006»
15 years 1 months ago
Understanding and Enhancing the Folding-In Method in Latent Semantic Indexing
Abstract. Latent Semantic Indexing(LSI) has been proved to be effective to capture the semantic structure of document collections. It is widely used in content-based text retrieval...
Xiang Wang 0002, Xiaoming Jin
WWW
2005
ACM
15 years 10 months ago
OWL DL vs. OWL flight: conceptual modeling and reasoning for the semantic Web
The Semantic Web languages RDFS and OWL have been around for some time now. However, the presence of these languages has not brought the breakthrough of the Semantic Web the creat...
Axel Polleres, Dieter Fensel, Jos de Bruijn, Rub&e...
CISC
2006
Springer
104views Cryptology» more  CISC 2006»
15 years 1 months ago
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
Abstract. A public-key cryptosystem is usually used for key management, in particular to session key management. The paper presents a method for handling a batch of concurrent keys...
Yongdong Wu, Feng Bao