Sciweavers

2062 search results - page 351 / 413
» Derivatives of Logical Formulas
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 5 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
80
Voted
ECBS
2007
IEEE
115views Hardware» more  ECBS 2007»
15 years 5 months ago
Modeling the Functionality of Multi-Functional Software Systems
Today, many software-based, reactive systems offer a multitude of functionality. One way to master the development of such a system is to model its functionality on an abstract le...
Alexander Gruler, Alexander Harhurin, Judith Hartm...
FUZZIEEE
2007
IEEE
15 years 5 months ago
Learning Undirected Possibilistic Networks with Conditional Independence Tests
—Approaches based on conditional independence tests are among the most popular methods for learning graphical models from data. Due to the predominance of Bayesian networks in th...
Christian Borgelt
GLVLSI
2007
IEEE
115views VLSI» more  GLVLSI 2007»
15 years 5 months ago
Novel architectures for efficient (m, n) parallel counters
Parallel counters are key elements in many arithmetic circuits, especially fast multipliers. In this paper, novel architectures and designs for high speed, low power (3, 2), (7, 3...
Sreehari Veeramachaneni, Lingamneni Avinash, Kirth...
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
15 years 5 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart