Sciweavers

350 search results - page 20 / 70
» What's in a Name
Sort
View
ICANN
2010
Springer
15 years 25 days ago
Policy Gradients for Cryptanalysis
So-called Physical Unclonable Functions are an emerging, new cryptographic and security primitive. They can potentially replace secret binary keys in vulnerable hardware systems an...
Frank Sehnke, Christian Osendorfer, Jan Sölte...
AAAI
2010
15 years 1 months ago
Integrity Constraints in OWL
In many data-centric applications, it is desirable to use OWL as an expressive schema language with which one expresses constraints that must be satisfied by instance data. However...
Jiao Tao, Evren Sirin, Jie Bao, Deborah L. McGuinn...
95
Voted
OWLED
2008
15 years 1 months ago
Opening, Closing Worlds - On Integrity Constraints
In many data-centric applications it is desirable to use OWL as an expressive schema language where one expresses constraints that need to be satisfied by the (instance) data. Howe...
Evren Sirin, Michael Smith, Evan Wallace
ACSAC
2006
IEEE
15 years 5 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
SIGSOFT
2007
ACM
16 years 15 days ago
An empirical study on the evolution of design patterns
Design patterns are solutions to recurring design problems, conceived to increase benefits in terms of reuse, code quality and, above all, maintainability and resilience to change...
Lerina Aversano, Gerardo Canfora, Luigi Cerulo, Co...