Sciweavers

307 search results - page 51 / 62
» Reasoning with Axioms: Theory and Practice
Sort
View
POPL
2005
ACM
15 years 9 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
ASIACRYPT
2009
Springer
15 years 4 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
LPNMR
2009
Springer
15 years 4 months ago
Translating Preferred Answer Set Programs to Propositional Logic
Abstract. We consider the problem of whether a given preferred answer set program can be reduced to a propositional formula. Research on this topic is of both theoretical and pract...
Vernon Asuncion, Yan Zhang
ATAL
2007
Springer
15 years 3 months ago
A framework for agent-based distributed machine learning and data mining
This paper proposes a framework for agent-based distributed machine learning and data mining based on (i) the exchange of meta-level descriptions of individual learning processes ...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek
TARK
2007
Springer
15 years 3 months ago
Vote manipulation in the presence of multiple sincere ballots
A classical result in voting theory, the Gibbard-Satterthwaite Theorem, states that for any non-dictatorial voting rule for choosing between three or more candidates, there will b...
Ulle Endriss