Sciweavers

3639 search results - page 54 / 728
» Provenance as Dependency Analysis
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 1 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
SCAM
2002
IEEE
15 years 2 months ago
Grammar Programming in TXL
Syntactic analysis forms a foundation of many source analysis and reverse engineering tools. However, a single grammar is not always appropriate for all source analysis and manipu...
Thomas R. Dean, James R. Cordy, Andrew J. Malton, ...
LREC
2010
135views Education» more  LREC 2010»
14 years 11 months ago
Partial Dependency Parsing for Irish
In this paper we present a partial dependency parser for Irish, in which Constraint Grammar (CG) rules are used to annotate dependency relations and grammatical functions in unres...
Elaine Uí Dhonnchadha, Josef van Genabith
OOPSLA
2005
Springer
15 years 3 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
RULEML
2010
Springer
14 years 8 months ago
Visualizing Logical Dependencies in SWRL Rule Bases
Rule bases are common in many business rule applications, clinical decision support programs, and other types of intelligent systems. As the size of the rule bases grows and the in...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das