Sciweavers

948 search results - page 141 / 190
» How People use Words to Make Meanings
Sort
View
ICSE
2008
IEEE-ACM
15 years 11 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
SP
2007
IEEE
120views Security Privacy» more  SP 2007»
15 years 5 months ago
Endorsed E-Cash
An electronic cash (e-cash) scheme lets a user withdraw money from a bank and then spend it anonymously. E-cash can be used only if it can be securely and fairly exchanged for ele...
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich
WISE
2005
Springer
15 years 4 months ago
Towards the Automation of E-Negotiation Processes Based on Web Services - A Modeling Approach
Abstract. E-Negotiation is the process of conducting negotiations between business partners using electronic means. The interest in e-negotiation is motivated by its potential to p...
Stefanie Rinderle, Morad Benyoucef
FOCS
2000
IEEE
15 years 3 months ago
The Randomness Recycler: A New Technique for Perfect Sampling
For many probability distributions of interest, it is quite difficult to obtain samples efficiently. Often, Markov chains are employed to obtain approximately random samples fro...
James Allen Fill, Mark Huber
SEMWEB
2010
Springer
14 years 9 months ago
JustBench: A Framework for OWL Benchmarking
Analysing the performance of OWL reasoners on expressive OWL ontologies is an ongoing challenge. In this paper, we present a new approach to performance analysis based on justifica...
Samantha Bail, Bijan Parsia, Ulrike Sattler