Sciweavers

3604 search results - page 668 / 721
» All Common Subsequences
Sort
View
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 28 days ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
HUC
2010
Springer
15 years 28 days ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
EMSOFT
2008
Springer
15 years 28 days ago
On the interplay of dynamic voltage scaling and dynamic power management in real-time embedded applications
Dynamic Voltage Scaling (DVS) and Dynamic Power Management (DPM) are two popular techniques commonly employed to save energy in real-time embedded systems. DVS policies aim at red...
Vinay Devadas, Hakan Aydin
GIS
2008
ACM
15 years 27 days ago
Automatic extraction of road intersection position, connectivity, and orientations from raster maps
The road network is one of the most important types of information on raster maps. In particular, the set of road intersection templates, which consists of the road intersection p...
Yao-Yi Chiang, Craig A. Knoblock
ICFP
2010
ACM
15 years 27 days ago
Logical types for untyped languages
Programmers reason about their programs using a wide variety of formal and informal methods. Programmers in untyped languages such as Scheme or Erlang are able to use any such met...
Sam Tobin-Hochstadt, Matthias Felleisen