Sciweavers

1431 search results - page 156 / 287
» Solving Constraints in Model Transformations
Sort
View
130
Voted
IANDC
2008
105views more  IANDC 2008»
15 years 24 days ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
133
Voted
UAI
2004
15 years 2 months ago
The Minimum Information Principle for Discriminative Learning
Exponential models of distributions are widely used in machine learning for classification and modelling. It is well known that they can be interpreted as maximum entropy models u...
Amir Globerson, Naftali Tishby
116
Voted
JCS
2010
124views more  JCS 2010»
14 years 11 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
CIVR
2010
Springer
247views Image Analysis» more  CIVR 2010»
14 years 7 months ago
Coherent bag-of audio words model for efficient large-scale video copy detection
Current content-based video copy detection approaches mostly concentrate on the visual cues and neglect the audio information. In this paper, we attempt to tackle the video copy d...
Yang Liu, Wanlei Zhao, Chong-Wah Ngo, Changsheng X...
114
Voted
ICLP
2005
Springer
15 years 6 months ago
Modeling Systems in CLP
We present a methodology for the modeling of complex program behavior in CLP. In the first part we present an informal description about how to represent a system in CLP. At its ...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu