Sciweavers

4150 search results - page 571 / 830
» A Practical Approach to Model Extension
Sort
View
PROMAS
2005
Springer
15 years 10 months ago
Declarative Agent Programming Support for a FIPA-Compliant Agent Platform
Multi-agent system(MAS) is a blooming research area, which exhibits a new paradigm for the design, modelling and implementation of complex systems. A significant amount of effort...
Mengqiu Wang, Mariusz Nowostawski, Martin K. Purvi...
143
Voted
EUROCRYPT
2004
Springer
15 years 10 months ago
Chosen-Ciphertext Security from Identity-Based Encryption
Abstract. We propose a simple and efficient construction of a CCAsecure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme. Our construction re...
Ran Canetti, Shai Halevi, Jonathan Katz
ASPDAC
2007
ACM
95views Hardware» more  ASPDAC 2007»
15 years 8 months ago
Optimization of Arithmetic Datapaths with Finite Word-Length Operands
Abstract: This paper presents an approach to area optimization of arithmetic datapaths that perform polynomial computations over bit-vectors with finite widths. Examples of such de...
Sivaram Gopalakrishnan, Priyank Kalla, Florian Ene...
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
ESWS
2008
Springer
15 years 6 months ago
Semantic Metadata Instantiation and Consolidation within an Ontology-based Multimedia Document Management System
Abstract. Automated modeling of appropriate and valid document descriptions is a central issue for the benefit and success of an ontologybased personal document management system. ...
Annett Mitschick, Ralf Nagel 0002, Klaus Meiß...