Sciweavers

1061 search results - page 145 / 213
» A general definition of malware
Sort
View
ASIACRYPT
2006
Springer
15 years 3 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
ASWSD
2006
Springer
15 years 3 months ago
TestML - A Test Exchange Language for Model-Based Testing of Embedded Software
Abstract. Test processes in the automotive industry are tool-intensive and affected by technologically heterogeneous test infrastructures. In the industrial practice a product has ...
Juergen Grossmann, Ines Fey, Alexander Krupp, Mirk...
CIKM
2006
Springer
15 years 3 months ago
Investigating the exhaustivity dimension in content-oriented XML element retrieval evaluation
INEX, the evaluation initiative for content-oriented XML retrieval, has since its establishment defined the relevance of an element according to two graded dimensions, exhaustivit...
Paul Ogilvie, Mounia Lalmas
CONCUR
2006
Springer
15 years 3 months ago
Event Structure Semantics for Nominal Calculi
Event structures have been used for giving true concurrent semantics to languages and models of concurrency such as CCS, Petri nets and graph grammars. Although certain nominal cal...
Roberto Bruni, Hernán C. Melgratti, Ugo Mon...
DAGM
2006
Springer
15 years 3 months ago
Shape Matching by Variational Computation of Geodesics on a Manifold
Abstract. Klassen et al. [9] recently developed a theoretical formulation to model shape dissimilarities by means of geodesics on appropriate spaces. They used the local geometry o...
Frank R. Schmidt, Michael Clausen, Daniel Cremers