Sciweavers

74 search results - page 15 / 15
» dam 2007
Sort
View
LICS
2007
IEEE
13 years 11 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam
IM
2007
13 years 6 months ago
Robust Monitoring of Network-wide Aggregates through Gossiping
Abstract—We investigate the use of gossip protocols for continuous monitoring of network-wide aggregates under crash failures. Aggregates are computed from local management varia...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...
CCCG
2001
13 years 6 months ago
Line voronoi diagram based interpolation and application to digital terrain modelling
Local coordinates based on the Voronoi diagram are used in natural neighbour interpolation to quantify the "neighbourliness" of data sites. In an earlier paper, we have ...
Francois Anton, Darka Mioc, Christopher M. Gold
ICNSC
2007
IEEE
13 years 11 months ago
Planning the Location of Intermodal Freight Hubs: an Agent Based Approach
—Intermodal freight transportation is defined as a system that carries freight from origin to destination by using two or more transportation modes. In this system, hubs are one ...
Koen H. van Dam, Zofia Verwater-Lukszo, Luis Ferre...