Sciweavers

671 search results - page 83 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
ANSS
2008
IEEE
15 years 8 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
VLSID
2004
IEEE
138views VLSI» more  VLSID 2004»
16 years 1 months ago
Synthesis-driven Exploration of Pipelined Embedded Processors
Recent advances on language based software toolkit generation enables performance driven exploration of embedded systems by exploiting the application behavior. There is a need fo...
Prabhat Mishra, Arun Kejariwal, Nikil Dutt
AGENTS
2001
Springer
15 years 6 months ago
Representing social structures in UML
From a software engineering perspective, agent systems are a specialization of object-oriented (OO) systems, in which individual objects have their own threads of control and thei...
H. Van Dyke Parunak, James Odell
IANDC
2008
105views more  IANDC 2008»
15 years 1 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
GIS
2009
ACM
15 years 5 months ago
Towards modeling the traffic data on road networks
A spatiotemporal network is a spatial network (e.g., road network) along with the corresponding time-dependent weight (e.g., travel time) for each edge of the network. The design ...
Ugur Demiryurek, Bei Pan, Farnoush Banaei Kashani,...