Sciweavers

10568 search results - page 1925 / 2114
» Computer Intelligence and Formalization
Sort
View
124
Voted
WIMOB
2008
IEEE
15 years 10 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
114
Voted
IEEEARES
2007
IEEE
15 years 10 months ago
Static evaluation of Certificate Policies for GRID PKIs interoperability
Validating an end-entity X.509 digital certificate prior to authorizing it for using a resource into the computational Grid has become a widely studied topic due to its importance...
Valentina Casola, Nicola Mazzocca, Jesus Luna, Osc...
123
Voted
ASIACRYPT
2007
Springer
15 years 9 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
131
Voted
ATVA
2007
Springer
87views Hardware» more  ATVA 2007»
15 years 9 months ago
Latticed Simulation Relations and Games
Multi-valued Kripke structures are Kripke structures in which the atomic propositions and the transitions are not Boolean and can take values from some set. In particular, latticed...
Orna Kupferman, Yoad Lustig
135
Voted
CAV
2007
Springer
166views Hardware» more  CAV 2007»
15 years 9 months ago
Fast and Accurate Static Data-Race Detection for Concurrent Programs
We present new techniques for fast, accurate and scalable static data race detection in concurrent programs. Focusing our analysis on Linux device drivers allowed us to identify th...
Vineet Kahlon, Yu Yang, Sriram Sankaranarayanan, A...
« Prev « First page 1925 / 2114 Last » Next »