Sciweavers

20175 search results - page 71 / 4035
» Is abstraction the key to computing
Sort
View
92
Voted
JNW
2008
103views more  JNW 2008»
15 years 17 days ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
95
Voted
IJCAI
2003
15 years 2 months ago
Keys, Nominals, and Concrete Domains
Many description logics (DLs) combine knowledge tation on an abstract, logical level with an interface to “concrete” domains such as numbers and strings. We propose to extend ...
Carsten Lutz, Carlos Areces, Ian Horrocks, Ulrike ...
72
Voted
MST
2008
80views more  MST 2008»
15 years 16 days ago
A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange
Abstract The transformation protocol can allow two players to share an unconditionally secure secret key using a random deal of cards. A sufficient condition on the number of cards...
Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki
92
Voted
DC
2000
15 years 12 days ago
Verification of the randomized consensus algorithm of Aspnes and Herlihy: a case study
ms, to use abstraction mappings to prove probabilistic properties, and to apply random walk theory in a distributed computational setting. We apply all of these techniques to analy...
Anna Pogosyants, Roberto Segala, Nancy A. Lynch
ISWC
2000
IEEE
15 years 5 months ago
Wearable Key: Device for Personalizing Nearby Environment
This paper describes a system that allows users who obtain a “wearable ID key” to personalize dynamically ubiquitous computers by simply touching them. We call the concept of ...
Nobuyuki Matsushita, Shigeru Tajima, Yuji Ayatsuka...