Sciweavers

15372 search results - page 2794 / 3075
» The Semantics of Semantic Annotation
Sort
View
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 4 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
SPE
2008
89views more  SPE 2008»
15 years 4 months ago
The Runabout
This paper presents a variation of the visitor pattern which allows programmers to write visitor-like code in a concise way. The Runabout is a library extension that adds a limited...
Christian Grothoff
STTT
2008
103views more  STTT 2008»
15 years 4 months ago
Model-based development of a course of action scheduling tool
Abstract. This paper shows how a formal method in the form of Coloured Petri Nets (CPNs) and the supporting CPN Tools have been used in the development of the Course of Action Sche...
Lars Michael Kristensen, Peter Mechlenborg, Lin Zh...
AMC
2005
138views more  AMC 2005»
15 years 4 months ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
IJSWIS
2007
133views more  IJSWIS 2007»
15 years 4 months ago
Association Rule Ontology Matching Approach
This paper presents a hybrid, extensional and asymmetric matching approach designed to find out semantic relations (equivalence and subsumption) between entities issued from two ...
Jérôme David, Fabrice Guillet, Henri ...
« Prev « First page 2794 / 3075 Last » Next »