Sciweavers

1923 search results - page 201 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
CONCUR
2007
Springer
15 years 4 months ago
Strategy Logic
We introduce strategy logic, a logic that treats strategies in two-player games as explicit first-order objects. The explicit treatment of strategies allows us to specify properti...
Krishnendu Chatterjee, Thomas A. Henzinger, Nir Pi...
NPC
2004
Springer
15 years 3 months ago
Paramecium: Assembling Raw Nodes into Composite Cells
In conventional DHTs, each node is assigned an exclusive slice of identifier space. Simple it is, such arrangement may be rough. In this paper we propose a generic component struc...
Ming Chen, Guangwen Yang, Yongwei Wu, Xuezheng Liu
IJNSEC
2006
98views more  IJNSEC 2006»
14 years 10 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao
DEBS
2008
ACM
14 years 12 months ago
Event-based constraints for sensornet programming
We propose a sensornet programming model based on declarative spatio-temporal constraints on events only, not sensors. Where previous approaches conflate events and sensors becaus...
Jie Mao, John Jannotti, Mert Akdere, Ugur Ç...
CVPR
2008
IEEE
16 years 3 days ago
Sparsity, redundancy and optimal image support towards knowledge-based segmentation
In this paper, we propose a novel approach to model shape variations. It encodes sparsity, exploits geometric redundancy, and accounts for the different degrees of local variation...
Salma Essafi, Georg Langs, Nikos Paragios