Sciweavers

5128 search results - page 87 / 1026
» When Abstraction Fails
Sort
View
CN
2008
100views more  CN 2008»
14 years 10 months ago
Packet forwarding with source verification
Abstract-- Routers in the Internet do not perform any verification of the source IP address contained in the packets, leading to the possibility of IP spoofing. The lack of such ve...
Craig A. Shue, Minaxi Gupta, Matthew P. Davy
BSL
2006
93views more  BSL 2006»
14 years 10 months ago
What is Tarski's common concept of consequence?
Abstract. In 1936 Tarski sketched a rigorous definition of the concept of logical consequence which, he claimed, agreed quite well with common usage--or, as he also said, with the ...
Ignacio Jané
IIE
2006
108views more  IIE 2006»
14 years 10 months ago
The IOI is (not) a Science Olympiad
Abstract. The International Olympiad in Informatics (IOI) aspires to be a science olympiad alongside such international olympiads in mathematics, physics, chemistry, and biology. I...
Tom Verhoeff
JAR
2006
107views more  JAR 2006»
14 years 9 months ago
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
Automated tools for finding attacks on flawed security protocols often fail to quately with group protocols. This is because the abstractions made to improve performance on fixed ...
Graham Steel, Alan Bundy
IPM
2007
100views more  IPM 2007»
14 years 9 months ago
User simulations for evaluating answers to question series
Recently, question series have become one focus of research in question answering. These series are comprised of individual factoid, list, and “other” questions organized arou...
Jimmy J. Lin