Sciweavers

43190 search results - page 8539 / 8638
» Can Development Be Designed
Sort
View
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
CP
2009
Springer
15 years 7 months ago
Constraint-Based Local Search for the Automatic Generation of Architectural Tests
Abstract. This paper considers the automatic generation of architectural tests (ATGP), a fundamental problem in processor validation. ATGPs are complex conditional constraint satis...
Pascal Van Hentenryck, Carleton Coffrin, Boris Gut...
DEBS
2009
ACM
15 years 7 months ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
MOBISYS
2010
ACM
15 years 6 months ago
MoVi: mobile phone based video highlights via collaborative sensing
Sensor networks have been conventionally defined as a network of sensor motes that collaboratively detect events and report them to a remote monitoring station. This paper makes a...
Xuan Bao, Romit Roy Choudhury
FLAIRS
2007
15 years 6 months ago
The Evolution and Evaluation of an Internet Search Tool for Information Analysts
We are working on a project aimed at building next generation analyst support tools that focus analysts’ attention on the most critical and novel information found within the da...
Elizabeth T. Whitaker, Robert L. Simpson Jr.
« Prev « First page 8539 / 8638 Last » Next »