Sciweavers

7109 search results - page 105 / 1422
» Process Algebra with Combinators
Sort
View
CCS
2006
ACM
15 years 4 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
FSE
2008
Springer
143views Cryptology» more  FSE 2008»
15 years 2 months ago
Algebraic and Slide Attacks on KeeLoq
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc...
Nicolas Courtois, Gregory V. Bard, David Wagner
PG
2007
IEEE
15 years 7 months ago
Visualisation of Implicit Algebraic Curves
We describe a new algorithm for the visualisation of implicit algebraic curves, which isolates the singular points, compute the topological degree around these points in order to ...
Lionel Alberti, Bernard Mourrain
JAPLL
2010
141views more  JAPLL 2010»
14 years 11 months ago
Algebraic tableau reasoning for the description logic SHOQ
Semantic web applications based on the web ontology language (OWL) often require the use of numbers in class descriptions for expressing cardinality restrictions on properties or ...
Jocelyne Faddoul, Volker Haarslev
ER
2009
Springer
118views Database» more  ER 2009»
15 years 7 months ago
Specifying Valid Compound Terms in Interrelated Faceted Taxonomies
In previous work, we proposed an algebra whose operators allow to specify the valid compound terms of a faceted taxonomy, in a flexible manner (by combining positive and negative ...
Anastasia Analyti, Yannis Tzitzikas, Nicolas Spyra...