Sciweavers

7206 search results - page 1265 / 1442
» Using a Hypermedia System for Systems Engineering
Sort
View
159
Voted
SAC
2010
ACM
15 years 10 months ago
Inductive reasoning and semantic web search
Extensive research activities are recently directed towards the Semantic Web as a future form of the Web. Consequently, Web search as the key technology of the Web is evolving tow...
Claudia d'Amato, Floriana Esposito, Nicola Fanizzi...
139
Voted
FOSSACS
2009
Springer
15 years 10 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
125
Voted
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
15 years 10 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
128
Voted
CIKM
2009
Springer
15 years 10 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
123
Voted
SARA
2009
Springer
15 years 10 months ago
Reformulating Planning Problems by Eliminating Unpromising Actions
Despite a big progress in solving planning problems, more complex problems still remain hard and challenging for existing planners. One of the most promising research directions i...
Lukás Chrpa, Roman Barták
« Prev « First page 1265 / 1442 Last » Next »