Sciweavers

12981 search results - page 2425 / 2597
» Model Checking (Abstract)
Sort
View
ASIACRYPT
2010
Springer
15 years 1 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
162
Voted
CNSM
2010
15 years 1 months ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba
126
Voted
DATESO
2010
96views Database» more  DATESO 2010»
15 years 1 months ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...
DLOG
2010
15 years 1 months ago
Distance-based Measures of Inconsistency and Incoherency for Description Logics
Abstract. Inconsistency and incoherency are two sorts of erroneous information in a DL ontology which have been widely discussed in ontology-based applications. For example, they h...
Yue Ma, Pascal Hitzler
150
Voted
EUROMED
2010
15 years 1 months ago
Communication of Digital Cultural Heritage in Public Spaces by the Example of Roman Cologne
Abstract. The communication of cultural heritage in public spaces such as museums or exhibitions, gain more and more importance during the last years. The possibilities of interact...
Matthias Trapp, Amir Semmo, Rafael Pokorski, Claus...
« Prev « First page 2425 / 2597 Last » Next »