Sciweavers

3458 search results - page 242 / 692
» Abstracting Control
Sort
View
ISPEC
2010
Springer
15 years 5 months ago
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
Abstract. Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control ...
Jacob C. N. Schuldt, Kanta Matsuura
ESANN
2007
15 years 5 months ago
Clustering a medieval social network by SOM using a kernel based distance measure
Abstract. In order to explore the social organization of a medieval peasant community before the Hundred Years’ War, we propose the use of an adaptation of the well-known Kohonen...
Nathalie Villa, Romain Boulet
MASCOTS
2008
15 years 5 months ago
Power Optimization in Fault-Tolerant MANETs
Abstract--In this paper, we investigate the problem of optimizing the lifetime of a mobile ad hoc network at a given degree k of connectivity by minimizing power consumption. Our p...
Oliviero Riganelli, Radu Grosu, Scott A. Smolka
FORTE
2004
15 years 5 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber
MST
2008
118views more  MST 2008»
15 years 3 months ago
Risk Assessment for One-Counter Threads
Abstract Threads as contained in a thread algebra are used for the modeling of sequential program behavior. A thread that may use a counter to control its execution is called a `on...
Alban Ponse, Mark van der Zwaag