Sciweavers

441 search results - page 19 / 89
» The logical approach to stack typing
Sort
View
AINA
2006
IEEE
15 years 3 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
96
Voted
WFLP
2000
Springer
124views Algorithms» more  WFLP 2000»
15 years 1 months ago
A Formal Approach to Reasoning about the Effectiveness of Partial Evaluation
We introduce a framework for assessing the effectiveness of partial evaluators in functional logic languages. Our framework is based on properties of the rewrite system that models...
Elvira Albert, Sergio Antoy, Germán Vidal
PR
2006
154views more  PR 2006»
14 years 9 months ago
A fuzzy logic approach for detection of video shot boundaries
Video temporal segmentation is normally the first and important step for content-based video applications. Many features including the pixel difference, colour histogram, motion, ...
Hui Fang, Jianmin Jiang, Yue Feng
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
14 years 11 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
ICTAI
2009
IEEE
15 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu