Sciweavers

1003 search results - page 137 / 201
» Extending the Adaptability of Reference Models
Sort
View
MSWIM
2009
ACM
15 years 8 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
JUCS
2010
214views more  JUCS 2010»
14 years 12 months ago
Multi-Device Context-Aware RIAs Using a Model-Driven Approach
: Model-Driven Development concepts are exhibiting as a good engineering solution for the design of ubiquitous applications with multi-device user interfaces and other contextaware...
Marino Linaje Trigueros, Juan Carlos Preciado, Fer...
IV
2000
IEEE
107views Visualization» more  IV 2000»
15 years 5 months ago
Ideograms in Polyscopic Modeling
“addiction” is defined as a pattern (abstract relationship). Such definition allows us to look in a new way at a number of cultural issues including the values, the lifestyl...
Dino Karabeg
ICARIS
2010
Springer
15 years 2 months ago
Biomedical Article Classification Using an Agent-Based Model of T-Cell Cross-Regulation
Abstract. We propose a novel bio-inspired solution for biomedical article classification. Our method draws from an existing model of T-cell cross-regulation in the vertebrate immun...
Alaa Abi-Haidar, Luis Mateus Rocha
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs