Fred A. Stahl

  • Citations Per Year
Learn More
The application of cryptographic transformations for the purpose of enhancing the security in data base systems is discussed. These transformations have been recognized in the past as a valuable protection mechanism but their relation to data base security has not been identified. The major reason is the lack of a suitable data base model for investigating(More)
Computational cryptography deals with the storage and processing of sensitive information in computer systems by enciphering. Sensitive information is information that for one reason or another must be protected from being disclosed to individuals without proper authorization. The need for systems to be secure from unauthorized access to sensitive(More)
A new data structure developed in connection with a natural language question-answering system is described. The data structure is based upon a new high-order calculus. It allows a great degree of expressiveness and is suitable for extensive logical deduction. The inadequacies of low-order schemes for the representation of natural language information are(More)
A descr ip t ion of techniques used for semantic modeling in a deductive question-answering system is given. The system maintains a d ia log and is able to understand s i t ua t i ons which can be expressed as a series of sequent ial t ime-frames. Speci f ic relevant questions are asked by the system when it is unable to succeed in a given task. It can also(More)
Present areas of application of computers to the law fall into three broad categories: (1) those involving applications of business accounting techniques such as in tax preparation and client billing, (2) those involving data management techniques such as law enforcement, criminal justice, and keyword legal source material information systems, and (3) those(More)
  • 1