Sciweavers

4382 search results - page 651 / 877
» Query by Semantic Example
Sort
View
CCS
2004
ACM
15 years 8 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers
FOSSACS
2004
Springer
15 years 8 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
ICCS
2004
Springer
15 years 8 months ago
Simulation Coercion Applied to Multiagent DDDAS
Abstract. The unpredictable run-time configurations of dynamic, datadriven application systems require flexible simulation components that can adapt to changes in the number of i...
Yannick Loitière, David C. Brogan, Paul F. ...
JELIA
2004
Springer
15 years 8 months ago
On the Relation Between ID-Logic and Answer Set Programming
This paper is an analysis of two knowledge representation extensions of logic programming, namely Answer Set Programming and ID-Logic. Our aim is to compare both logics on the leve...
Maarten Mariën, David Gilis, Marc Denecker
MLMI
2004
Springer
15 years 8 months ago
Accessing Multimodal Meeting Data: Systems, Problems and Possibilities
As the amount of multimodal meetings data being recorded increases, so does the need for sophisticated mechanisms for accessing this data. This process is complicated by the diffe...
Simon Tucker, Steve Whittaker