Sciweavers

2268 search results - page 218 / 454
» The Essence of Form Abstraction
Sort
View
JOT
2010
113views more  JOT 2010»
15 years 8 days ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada
JUCS
2010
134views more  JUCS 2010»
15 years 8 days ago
Newton Method for Nonlinear Dynamic Systems with Adaptive Time Stepping
Abstract: This paper presents a nonlinear solver based on the Newton-Krylov methods, where the Newton equations are solved by Krylov-subspace type approaches. We focus on the solut...
Wensheng Shen, Changjiang Zhang, Jun Zhang, Xiaoqi...
112
Voted
LATINCRYPT
2010
15 years 8 days ago
Broadcast Encryption with Multiple Trust Authorities
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...
LPAR
2010
Springer
15 years 8 days ago
Clause Elimination Procedures for CNF Formulas
Abstract. We develop and analyze clause elimination procedures, a specific family of simplification techniques for conjunctive normal form (CNF) formulas. Extending known procedu...
Marijn Heule, Matti Järvisalo, Armin Biere
110
Voted
MDAI
2010
Springer
15 years 8 days ago
Pattern Mining on Stars with FP-Growth
Abstract. Most existing data mining (DM) approaches look for patterns in a single table. Multi-relational DM approaches, on the other hand, look for patterns that involve multiple ...
Andreia Silva, Cláudia Antunes