Sciweavers

24451 search results - page 4833 / 4891
» Research methods in information
Sort
View
CCS
2008
ACM
14 years 12 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
BTW
2005
Springer
90views Database» more  BTW 2005»
14 years 12 months ago
The Importance of Being Earnest about Definitions
: Ideas from terminology management, the science of terms and definitions, can be used to improve the quality of software and data models, as well as to facilitate the achievement ...
Susan Thomas
CASES
2005
ACM
14 years 12 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
CIVR
2008
Springer
125views Image Analysis» more  CIVR 2008»
14 years 11 months ago
(Un)Reliability of video concept detection
Great effort has been made to improve video concept detection and continuous progress has been reported. With the current evaluation method being confined to carefully annotated d...
Jun Yang 0003, Alexander G. Hauptmann
DIAGRAMS
2008
Springer
14 years 11 months ago
Graphical Revelations: Comparing Students' Translation Errors in Graphics and Logic
We are interested in developing a better understanding of what it is that students find difficult in learning logic. We use both natural language and diagram-based methods for teac...
Richard Cox, Robert Dale, John Etchemendy, Dave Ba...
« Prev « First page 4833 / 4891 Last » Next »