Sciweavers

1166 search results - page 194 / 234
» Adaptively Secure Broadcast
Sort
View
130
Voted
ECUMN
2007
Springer
15 years 6 months ago
Study and Enhancement of DCCP over DiffServ Assured Forwarding Class
The Datagram Congestion Control Protocol (DCCP) has been proposed as a transport protocol which supports real-time traffic. In this paper, we focus on the use of DCCP/CCID3 (Cong...
Emmanuel Lochin, Guillaume Jourjon, Laurent Dairai...
IRI
2006
IEEE
15 years 6 months ago
Toward component non-functional interoperability analysis: A UML-based and goal-oriented approach
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
121
Voted
AAECC
2006
Springer
135views Algorithms» more  AAECC 2006»
15 years 6 months ago
Applying Fujisaki-Okamoto to Identity-Based Encryption
The Fujisaki-Okamoto (FO) conversion is widely known to be able to generically convert a weak public key encryption scheme, say one-way against chosen plaintext attacks (OW-CPA), t...
Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka...
85
Voted
OOPSLA
2005
Springer
15 years 6 months ago
Subtext: uncovering the simplicity of programming
Representing programs as text strings makes programming harder then it has to be. The source text of a program is far removed from its behavior. Bridging this conceptual gulf is w...
Jonathan Edwards
AUSAI
2003
Springer
15 years 5 months ago
Towards Automated Creation of Image Interpretation Systems
Abstract. Automated image interpretation is an important task in numerous applications ranging from security systems to natural resource inventorization based on remote-sensing. Re...
Ilya Levner, Vadim Bulitko, Lihong Li, Greg Lee, R...