Sciweavers

634 search results - page 82 / 127
» Groundwork for Weak Analysis
Sort
View
BIS
2010
246views Business» more  BIS 2010»
15 years 3 months ago
On the Cognitive Effectiveness of Routing Symbols in Process Modeling Languages
Abstract. Process models provide visual support for analyzing and improving complex organizational processes. In this paper, we discuss differences of process modeling languages us...
Kathrin Figl, Jan Mendling, Mark Strembeck, Jan Re...
CSL
2010
Springer
15 years 3 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
CCS
2010
ACM
15 years 2 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
SIAMAM
2008
80views more  SIAMAM 2008»
15 years 1 months ago
The Factorization Method for Electrical Impedance Tomography in the Half-Space
We consider the inverse problem of electrical impedance tomography in a conducting half space, given electrostatic measurements on its boundary, i.e., a hyperplane. We first provid...
Martin Hanke, Birgit Schappel
TCS
2008
15 years 1 months ago
Computational self-assembly
The object of this paper is to appreciate the computational limits inherent in the combinatorics of an applied concurrent (aka agent-based) language . That language is primarily m...
Pierre-Louis Curien, Vincent Danos, Jean Krivine, ...