Sciweavers

7918 search results - page 1529 / 1584
» Model Composition Directives
Sort
View
SASN
2005
ACM
15 years 6 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
102
Voted
SOUPS
2005
ACM
15 years 6 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
SPAA
2005
ACM
15 years 6 months ago
Fast construction of overlay networks
An asynchronous algorithm is described for rapidly constructing an overlay network in a peer-to-peer system where all nodes can in principle communicate with each other directly t...
Dana Angluin, James Aspnes, Jiang Chen, Yinghua Wu...
103
Voted
AIME
2005
Springer
15 years 6 months ago
Multi-agent Patient Representation in Primary Care
Though multi-agent systems have been explored in a wide variety of medical settings, their role at the primary care level has been relatively little investigated. In this paper, we...
Chris Reed, Brian Boswell, Ron Neville
134
Voted
CAV
2005
Springer
150views Hardware» more  CAV 2005»
15 years 6 months ago
Reasoning About Threads Communicating via Locks
Abstract. We propose a new technique for the static analysis of concurrent programs comprised of multiple threads. In general, the problem is known to be undecidable even for progr...
Vineet Kahlon, Franjo Ivancic, Aarti Gupta
« Prev « First page 1529 / 1584 Last » Next »