Sciweavers

5684 search results - page 278 / 1137
» Computing with active dendrites
Sort
View
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 10 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
WECWIS
2006
IEEE
87views ECommerce» more  WECWIS 2006»
15 years 10 months ago
SLA Automated Negotiation Manager for Computing Services
Success in today’s marketing arena can often depend on companies embracing effective new technologies and integrating them into their business model. In the computing service su...
Halina Kaminski, Mark Perry
APLAS
2006
ACM
15 years 10 months ago
Computational Secrecy by Typing for the Pi Calculus
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At the source level, we adapt simple type systems designed for establishing formal ...
Martín Abadi, Ricardo Corin, Cédric ...
SIGCSE
1998
ACM
116views Education» more  SIGCSE 1998»
15 years 9 months ago
Constructivism in computer science education
ions, and (c) the seductive reality of the computer must not be allowed to supplant construction of models. The dominant theory of learning today is called constructivism. This the...
Mordechai Ben-Ari
ICAD
2004
15 years 6 months ago
Auditory Feedback of Human EEG for Direct Brain-Computer Communication
The Thought-Translation-Device (TTD) is a Brain-ComputerInterface (BCI) that enables completely paralyzed patients to communicate by the use of their brain signals only. Selfregul...
Thilo Hinterberger, Gerold Baier, Jürgen Mell...