Sciweavers

1021 search results - page 149 / 205
» Concepts in Proof Planning
Sort
View
CCS
2008
ACM
15 years 1 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
CDC
2008
IEEE
192views Control Systems» more  CDC 2008»
15 years 1 months ago
Distributed coordination algorithms for multiple fractional-order systems
Abstract-- This paper studies distributed coordination algorithms for multiple fractional-order systems over a directed communication graph. A general fractional-order consensus mo...
Yongcan Cao, Yan Li, Wei Ren, Yangquan Chen
ECLIPSE
2005
ACM
15 years 1 months ago
Instant IDEs: supporting new languages in the CDT
While Eclipse has greatly simplified the task of creating integrated development environments, creating a full-featured IDE can still take years. Fortunately, for a large categor...
Jeffrey Overbey, Craig Rasmussen
CONEXT
2008
ACM
15 years 1 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
IESA
2007
15 years 1 months ago
UN/CEFACT Core Components as the basis for structured business communication by SMEs, employing auto-generated, user adjustable
In this paper a methodology is presented to generate webforms for business documents directly from XML schemas. XML Schemas that are based on the UN/CEFACT Naming and Design Rules ...
Fred van Blommestein, Bertjan Broeksema