Sciweavers

5484 search results - page 1032 / 1097
» Almost-Everywhere Secure Computation
Sort
View
IFM
2010
Springer
190views Formal Methods» more  IFM 2010»
14 years 10 months ago
On Model Checking Techniques for Randomized Distributed Systems
Abstract. The automata-based model checking approach for randomized distributed systems relies on an operational interleaving semantics of the system by means of a Markov decision ...
Christel Baier
MOBIHOC
2010
ACM
14 years 9 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
EUROSYS
2008
ACM
15 years 9 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
ACISP
2009
Springer
15 years 6 months ago
Inside the Hypercube
Bernstein’s CubeHash is a hash function family that includes four functions submitted to the NIST Hash Competition. A CubeHash function is parametrized by a number of rounds r, a...
Jean-Philippe Aumasson, Eric Brier, Willi Meier, M...
AGENTS
1997
Springer
15 years 4 months ago
RoboCup: The Robot World Cup Initiative
The Robot World Cup Initiative (RoboCup) is an attempt to foster AI and intelligent robotics research by providing a standard problem where wide range of technologies can be integ...
Hiroaki Kitano, Minoru Asada, Yasuo Kuniyoshi, Its...
« Prev « First page 1032 / 1097 Last » Next »