Sciweavers

671 search results - page 83 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
ANSS
2008
IEEE
15 years 6 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
VLSID
2004
IEEE
138views VLSI» more  VLSID 2004»
16 years 5 days ago
Synthesis-driven Exploration of Pipelined Embedded Processors
Recent advances on language based software toolkit generation enables performance driven exploration of embedded systems by exploiting the application behavior. There is a need fo...
Prabhat Mishra, Arun Kejariwal, Nikil Dutt
AGENTS
2001
Springer
15 years 4 months ago
Representing social structures in UML
From a software engineering perspective, agent systems are a specialization of object-oriented (OO) systems, in which individual objects have their own threads of control and thei...
H. Van Dyke Parunak, James Odell
IANDC
2008
105views more  IANDC 2008»
14 years 12 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
GIS
2009
ACM
15 years 3 months ago
Towards modeling the traffic data on road networks
A spatiotemporal network is a spatial network (e.g., road network) along with the corresponding time-dependent weight (e.g., travel time) for each edge of the network. The design ...
Ugur Demiryurek, Bei Pan, Farnoush Banaei Kashani,...