Sciweavers

930 search results - page 73 / 186
» A Universal Encryption Standard
Sort
View
122
Voted
LICS
2003
IEEE
15 years 9 months ago
An NP Decision Procedure for Protocol Insecurity with XOR
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
Yannick Chevalier, Ralf Küsters, Michaël...
MM
2003
ACM
262views Multimedia» more  MM 2003»
15 years 9 months ago
ARMS: adaptive rich media secure streaming
In this demonstration we present the ARMS system which enables secure and adaptive rich media streaming to a large-scale, heterogeneous client population. The ARMS system dynamica...
Lisa Amini, Raymond Rose, Chitra Venkatramani, Oli...
SIGCSE
2010
ACM
132views Education» more  SIGCSE 2010»
15 years 11 months ago
Undergraduate computer science education in China
This paper examines the current status of professional computing education for undergraduate majors and fundamental computer education for non-majors in China. We describe the evo...
Ming Zhang, Virginia Mary Lo
129
Voted
OTM
2007
Springer
15 years 10 months ago
An Evaluation of Triple-Store Technologies for Large Data Stores
Abstract. This paper presents a comparison of performance of various triplestore technologies currently in either production release or beta test. Our comparison of triple-store te...
Kurt Rohloff, Mike Dean, Ian Emmons, Dorene Ryder,...
IFIP
1997
Springer
15 years 8 months ago
Representing a body of knowledge for teaching, learning and assessment
: National and international standards for professional groups may become a dominant and governing force as internet-based professional training becomes universally accepted. Educa...
Don Sheridan, David White