Sciweavers

1302 search results - page 201 / 261
» Soundness in the Public-Key Model
Sort
View
DLOG
2008
15 years 2 months ago
SRIQ and SROIQ are Harder than SHOIQ
We identify the complexity of (finite model) reasoning in the DL SROIQ to be N2ExpTime-complete. We also prove that (finite model) reasoning in the DL SR--a fragment of SROIQ witho...
Yevgeny Kazakov
METMBS
2003
255views Mathematics» more  METMBS 2003»
15 years 1 months ago
Causal Explorer: A Causal Probabilistic Network Learning Toolkit for Biomedical Discovery
Causal Probabilistic Networks (CPNs), (a.k.a. Bayesian Networks, or Belief Networks) are well-established representations in biomedical applications such as decision support system...
Constantin F. Aliferis, Ioannis Tsamardinos, Alexa...
CORR
2008
Springer
143views Education» more  CORR 2008»
14 years 12 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
FDTC
2010
Springer
138views Cryptology» more  FDTC 2010»
14 years 10 months ago
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
Many implementations of cryptographic algorithms have shown to be susceptible to fault attacks. For some of them, countermeasures against specific fault models have been proposed. ...
Marcel Medwed, Jörn-Marc Schmidt
GI
2009
Springer
14 years 9 months ago
Tracking Algorithms for Bistatic Sonar Systems
: An active sonar system consists of a sound source activating a surveillance area and a receiver listening for echoes reflected from targets. In a bistatic setup, the source and t...
Martina Daun, Frank Ehlers