Sciweavers

496 search results - page 71 / 100
» Generation Gaps Revisited
Sort
View
TCC
2005
Springer
115views Cryptology» more  TCC 2005»
15 years 5 months ago
The Universal Composable Security of Quantum Key Distribution
The existing unconditional security definitions of quantum key distribution (QKD) do not apply to joint attacks over QKD and the subsequent use of the resulting key. In this paper...
Michael Ben-Or, Michal Horodecki, Debbie W. Leung,...
RE
2004
Springer
15 years 5 months ago
From Aspectual Requirements to Proof Obligations for Aspect-Oriented Systems
Aspect-oriented software development (AOSD) techniques support systematic modularization and composition of crosscutting concerns. Though AOSD techniques have been proposed to han...
Shmuel Katz, Awais Rashid
ICDAR
2003
IEEE
15 years 5 months ago
Extraction, layout analysis and classification of diagrams in PDF documents
Diagrams are a critical part of virtually all scientific and technical documents. Analyzing diagrams will be important for building comprehensive document retrieval systems. This ...
Robert P. Futrelle, Mingyan Shao, Chris Cieslik, A...
GECON
2009
Springer
125views Business» more  GECON 2009»
15 years 4 months ago
Message Protocols for Provisioning and Usage of Computing Services
Abstract. The commercial availability of computational resources enable consumers to scale their applications on-demand. However, it is necessary for both consumers and providers o...
Nikolay Borissov, Simon Caton, Omer F. Rana, Aharo...
LADS
2009
Springer
15 years 4 months ago
Temporal Planning in Dynamic Environments for P-CLAIM Agents
—Time and uncertainty of the environment are very important aspects in the development of real world applications. Another important issue for the real world agents is, the balan...
Muhammad Adnan Hashmi, Amal El Fallah-Seghrouchni