Sciweavers

784 search results - page 22 / 157
» An underlying model for defeat mechanisms
Sort
View
JIIS
2006
83views more  JIIS 2006»
14 years 9 months ago
Querying a summary of database
For some years, data summarization techniques have been developed to handle the growth of databases. However these techniques are usually not provided with tools for enduserstoeffi...
W. Amenel Voglozin, Guillaume Raschia, Laurent Ugh...
WICSA
2004
14 years 11 months ago
Style-Based Refinement of Dynamic Software Architectures
In this paper, we address the correct refinement of abstract architectural models into more platformspecific representations. We consider the challenging case of dynamic architect...
Luciano Baresi, Reiko Heckel, Sebastian Thöne...
AMC
2006
91views more  AMC 2006»
14 years 9 months ago
Lateral load estimation from visco-plastic mud-flow around cylindrical row of piles
In this paper, the influence of slow and creeping flow of mud/slurry is modelled as a visco-plastic fluid around cylindrical row of piles. The study is carried out theoretically u...
Seyhan Firat, Mehmet Saribiyik, Erkan Çeleb...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 6 days ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
SIGECOM
2010
ACM
226views ECommerce» more  SIGECOM 2010»
15 years 2 months ago
Auctions with online supply
We study the problem of selling identical goods to n unit-demand bidders in a setting in which the total supply of goods is unknown to the mechanism. Items arrive dynamically, and...
Moshe Babaioff, Liad Blumrosen, Aaron Roth