Results 1 - 10
of
5,042
Formal Languages
, 1973
"... Close to 30 percent of all patents are chemical patents, of which roughly 10 percent claim IP rights over novel chemical structures using the Markush notation[1-5]. An example of an approved patent with claims on a series of 4-anilino-3-quinolinecarbonitriles-based chemical structures for the ..."
Abstract
-
Cited by 574 (41 self)
- Add to MetaCart
Close to 30 percent of all patents are chemical patents, of which roughly 10 percent claim IP rights over novel chemical structures using the Markush notation[1-5]. An example of an approved patent with claims on a series of 4-anilino-3-quinolinecarbonitriles-based chemical structures for the
Lexical-Functional Grammar: A Formal System for Grammatical Representation
- IN: FORMAL ISSUES IN LEXICAL-FUNCTIONAL GRAMMAR
, 1995
"... In learning their native language, children develop a remarkable set of capabilities. They acquire knowledge and skills that enable them to produce and comprehend an indefinite number of novel utterances, and to make quite subtle judgments about certain of their properties. The major goal of psychol ..."
Abstract
-
Cited by 609 (23 self)
- Add to MetaCart
In learning their native language, children develop a remarkable set of capabilities. They acquire knowledge and skills that enable them to produce and comprehend an indefinite number of novel utterances, and to make quite subtle judgments about certain of their properties. The major goal
Logical foundations of object-oriented and frame-based languages
- JOURNAL OF THE ACM
, 1995
"... We propose a novel formalism, called Frame Logic (abbr., F-logic), that accounts in a clean and declarative fashion for most of the structural aspects of object-oriented and frame-based languages. These features include object identity, complex objects, inheritance, polymorphic types, query methods, ..."
Abstract
-
Cited by 876 (65 self)
- Add to MetaCart
We propose a novel formalism, called Frame Logic (abbr., F-logic), that accounts in a clean and declarative fashion for most of the structural aspects of object-oriented and frame-based languages. These features include object identity, complex objects, inheritance, polymorphic types, query methods
ℓ-diversity: Privacy beyond k-anonymity
- IN ICDE
, 2006
"... Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a new definition of privacy called k-anonymity has gained popularity. In a k-anonymized dataset, each record is indistinguishable from at least k − 1 other records with resp ..."
Abstract
-
Cited by 672 (13 self)
- Add to MetaCart
of attack is a known problem [60]. Second, attackers often have background knowledge, and we show that k-anonymity does not guarantee privacy against attackers using background knowledge. We give a detailed analysis of these two attacks and we propose a novel and powerful privacy criterion called ℓ
Secure Group Communications Using Key Graphs
- SIGCOMM '98
, 1998
"... Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of au ..."
Abstract
-
Cited by 556 (17 self)
- Add to MetaCart
of authorized receivers. As a result, securing group communications (i.e., providing confidentiality, integrity, and authenticity of messages delivered between group members) will become a critical networking issue. In this paper, we present a novel solution to the scalability problem of group/multicast key
Geodesic Active Contours
, 1997
"... A novel scheme for the detection of object boundaries is presented. The technique is based on active contours evolving in time according to intrinsic geometric measures of the image. The evolving contours naturally split and merge, allowing the simultaneous detection of several objects and both in ..."
Abstract
-
Cited by 1425 (47 self)
- Add to MetaCart
A novel scheme for the detection of object boundaries is presented. The technique is based on active contours evolving in time according to intrinsic geometric measures of the image. The evolving contours naturally split and merge, allowing the simultaneous detection of several objects and both
Querying object-oriented databases
- ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA
, 1992
"... We present a novel language for querying object-oriented databases. The language is built around the idea of extended path expressions that substantially generalize [ZAN83], and on an adaptation of the first-order formalization of object-oriented languages from [KW89, KLW90, KW92]. The language inco ..."
Abstract
-
Cited by 492 (6 self)
- Add to MetaCart
We present a novel language for querying object-oriented databases. The language is built around the idea of extended path expressions that substantially generalize [ZAN83], and on an adaptation of the first-order formalization of object-oriented languages from [KW89, KLW90, KW92]. The language
A Novel Formal Semantics for a Parallel Object-Oriented Language
"... The Parallel Object-Oriented language POOL integrates object-oriented characteristics with synchronous communication among objects. A novel formal description of POOL is given here. The description is written using Mosses' action notation style of formal specification. It is then, compared with ..."
Abstract
- Add to MetaCart
The Parallel Object-Oriented language POOL integrates object-oriented characteristics with synchronous communication among objects. A novel formal description of POOL is given here. The description is written using Mosses' action notation style of formal specification. It is then, compared
The RC5 Encryption Algorithm
, 1995
"... Abstract. This document describes the RC5 encryption algorithm. RC5 is a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-lengt ..."
Abstract
-
Cited by 363 (7 self)
- Add to MetaCart
Abstract. This document describes the RC5 encryption algorithm. RC5 is a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable
STDEVS: A Novel Formalism for Modeling And Simulation of Stochastic Discrete Event Systems
- IN AADECA 2006, BUENOS AIRES
, 2006
"... This article presents an extension of the DEVS formalism to represent stochastic discrete event systems. Making use of probability space theory, the resulting STDEVS formalism provides a formal framework for modeling an simulation of non--deterministic DEVS models. ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This article presents an extension of the DEVS formalism to represent stochastic discrete event systems. Making use of probability space theory, the resulting STDEVS formalism provides a formal framework for modeling an simulation of non--deterministic DEVS models.
Results 1 - 10
of
5,042