no code implementations • 14 May 2020 • Henrik Forssell, Ragnar Thobaben
However, with PLA-aware attack strategies, an attacker can maximize the probability of successfully impersonating the legitimate devices.
no code implementations • 14 Jan 2020 • Henrik Forssell, Evgeny Kharlamov, Evgenij Thorstensen
However, for Closed Powerset semantics we show that one can find, for any incomplete database, a unique finite set of its subinstances which are subinstances (up to renaming of nulls) of all instances semantically equivalent to the original incomplete one.
no code implementations • 27 Sep 2018 • Henrik Forssell, Christian Kindermann, Daniel P. Lupp, Uli Sattler, Evgenij Thorstensen
We present a second-order language that can be used to succinctly specify ontologies in a consistent and transparent manner.