Sciweavers

17541 search results - page 3357 / 3509
» Complexity in scalable computing
Sort
View
DLT
2009
14 years 7 months ago
Branching-Time Temporal Logics with Minimal Model Quantifiers
Abstract. Temporal logics are a well investigated formalism for the specification and verification of reactive systems. Using formal verification techniques, we can ensure the corr...
Fabio Mogavero, Aniello Murano
EUROPKI
2009
Springer
14 years 7 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
GI
2009
Springer
14 years 7 months ago
AnToNIa: A Software Tool for the Hemodynamic Analysis of Cerebral Vascular Malformations Using 3D and 4D MRA Image Sequences
Abstract: Stroke is the second most common cause of death and major cause of disability worldwide. Approx. 20% of cerebral strokes are caused by hemorrhages due to rupture of cereb...
Nils Daniel Forkert, Dennis Säring, Jens Fieh...
GI
2009
Springer
14 years 7 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
GI
2009
Springer
14 years 7 months ago
Generating Product-based Availability Overviews for Fixed Line Network Access Points
: Product customization has become a commonplace topic in the last few years. Cars can be equipped with numerous gadgets, cell phones come in different colours and so on. In all th...
Christoph Wiesen, Thorsten Wunderlich, Robert Mert...
« Prev « First page 3357 / 3509 Last » Next »