Sciweavers

784 search results - page 64 / 157
» An underlying model for defeat mechanisms
Sort
View
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
15 years 3 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
PE
2010
Springer
123views Optimization» more  PE 2010»
14 years 4 months ago
Evaluating fluid semantics for passive stochastic process algebra cooperation
Fluid modelling is a next-generation technique for analysing massive performance models. Passive cooperation is a popular cooperation mechanism frequently used by performance engi...
Richard A. Hayden, Jeremy T. Bradley
SUM
2009
Springer
15 years 2 months ago
Compression of Probabilistic XML Documents
Database techniques to store, query and manipulate data that contains uncertainty receives increasing research interest. Such UDBMSs can be classified according to their underlyin...
Irma Veldman, Ander de Keijzer, Maurice van Keulen
JNW
2008
129views more  JNW 2008»
14 years 10 months ago
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN
This paper proposes a network-initiated terminal mobility mechanism (NITM) to facilitate handover with the session initiation protocol (SIP) in 3GPP Voice over WLAN (3GPP VoWLAN). ...
Wei-Kuo Chiang, Hsin-Fu Huang
IJWET
2007
152views more  IJWET 2007»
14 years 9 months ago
Semantic web technologies for ubiquitous computing resource management in smart spaces
: Context-aware ubiquitous computing environments tend to be highly distributed and heterogeneous, while also featuring increased dynamism as elements, devices and middleware compo...
John Soldatos, Kostas Stamatis, Siamak Azodolmolky...