Sciweavers

4815 search results - page 827 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
150
Voted
CSFW
2004
IEEE
15 years 7 months ago
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
Michael Backes, Birgit Pfitzmann
136
Voted
SPW
2000
Springer
15 years 7 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
BPM
2008
Springer
192views Business» more  BPM 2008»
15 years 5 months ago
Trace Clustering in Process Mining
Process mining has proven to be a valuable tool for analyzing operational process executions based on event logs. Existing techniques perform well on structured processes, but stil...
Minseok Song, Christian W. Günther, Wil M. P....
WSC
2004
15 years 5 months ago
An Automatic Distributed Simulation Environment
Developing a sequential simulation program is not an easy task. Developing a distributed simulation program is harder than a sequential one because it is necessary to deal with ma...
Sarita Mazzini Bruschi, Regina Helena Carlucci San...
CDC
2008
IEEE
204views Control Systems» more  CDC 2008»
15 years 10 months ago
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
Anshu Saksena, I-Jeng Wang