Sciweavers

755 search results - page 58 / 151
» ideas 2005
Sort
View
TARK
2005
Springer
15 years 3 months ago
Decisions under subjective information
This paper addresses two closely related aspects of subjective information. First, no two agents necessarily see the same thing when they observe the same object. Second, no two a...
Jack Stecher
TGC
2005
Springer
15 years 3 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
TRUSTBUS
2005
Springer
15 years 3 months ago
Privacy Enhanced Technologies: Methods - Markets - Misuse
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the util...
Hannes Federrath
TSD
2005
Springer
15 years 3 months ago
Automatic Acquisition of a Slovak Lexicon from a Raw Corpus
This paper presents an automatic methodology we used in an experiment to acquire a morphological lexicon for the Slovak language, and the lexicon we obtained. This methodology exte...
Benoît Sagot
UML
2005
Springer
15 years 3 months ago
Extending the Boundaries of Model-Based Development to Account for Errors
This paper presents an approach for relating informed task models and system models in the domain of safety critical interactive systems. The models, which are usually developed f...
Sandra Basnyat, Rémi Bastide, Philippe A. P...