Sciweavers

3758 search results - page 557 / 752
» A Complete Subsumption Algorithm
Sort
View
123
Voted
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
15 years 8 months ago
A Practical and Tightly Secure Signature Scheme Without Hash Function
In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA problem) were independently introduced: the Gennaro-Halevi-Rabin (GHR) signature scheme and the...
Benoît Chevallier-Mames, Marc Joye
120
Voted
ER
2007
Springer
127views Database» more  ER 2007»
15 years 8 months ago
Generic Schema Mappings
Schema mappings come in different flavors: simple correspondences are produced by schema matchers, intensional mappings are used for schema integration. However, the execution of ...
David Kensche, Christoph Quix, Yong Li, Matthias J...
134
Voted
EUC
2007
Springer
15 years 8 months ago
Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems
Networked embedded systems present unique challenges for system designers composing distributed applications with dyanmic, real-time, and resilience requirements. We consider the ...
Binoy Ravindran, Edward Curley, Jonathan Stephen A...
104
Voted
EUROPAR
2007
Springer
15 years 8 months ago
Surrendering Autonomy: Can Cooperative Mobility Help?
In this paper, we develop a Cooperative Mobility Model that captures new salient features of collaborative and mission-oriented MANETs. In particular, the cost-benefit framework o...
Ghassen Ben Brahim, Bilal Khan, Ala I. Al-Fuqaha, ...
103
Voted
FMCAD
2007
Springer
15 years 8 months ago
Formal Verification of Partial Good Self-Test Fencing Structures
— The concept of applying partial fencing to logic built-in self test (LBIST) hardware structures for the purpose of using partially good chips is well known in the chip design i...
Adrian E. Seigler, Gary A. Van Huben, Hari Mony