Sciweavers

2209 search results - page 295 / 442
» Language Based Secure Communication
Sort
View
109
Voted
APNOMS
2007
Springer
15 years 9 months ago
Standby Power Control Architecture in Context-Aware Home Networks
Standby power is the energy consumed by appliances when they are not performing their main functions or when they are switched off. In this paper, we propose a Host-Agent based sta...
Joon Heo, Jihyuk Heo, Choong Seon Hong, Seok Bong ...
IH
2001
Springer
15 years 8 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
110
Voted
PST
2008
15 years 4 months ago
Encoding the Program Correctness Proofs as Programs in PCC Technology
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inh...
Heidar Pirzadeh, Danny Dubé
DATE
2000
IEEE
113views Hardware» more  DATE 2000»
15 years 7 months ago
MASCOT: A Specification and Cosimulation Method Integrating Data and Control Flow
We integrate data and control flow at the system specification level, using the two specialized and well established languages Matlab and SDL. For this we provide a modeling techn...
Per Bjuréus, Axel Jantsch
131
Voted
INFORMATICALT
2000
157views more  INFORMATICALT 2000»
15 years 3 months ago
The Analysis of Unstructured Processes in Business Administration
Abstract. One of the problem in business process reengineering is the identification and implementation of new workflow procedures for specific business processes, if they are not ...
Alvydas Jaliniauskas