Sciweavers

8928 search results - page 1744 / 1786
» Modeling Current Events
Sort
View
CCS
2008
ACM
15 years 4 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
HYBRID
2010
Springer
15 years 3 months ago
Receding horizon control for temporal logic specifications
In this paper, we describe a receding horizon scheme that satisfies a class of linear temporal logic specifications sufficient to describe a wide range of properties including saf...
Tichakorn Wongpiromsarn, Ufuk Topcu, Richard M. Mu...
DIM
2005
ACM
15 years 3 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
CLEF
2008
Springer
15 years 3 months ago
Allomorfessor: Towards Unsupervised Morpheme Analysis
Many modern natural language processing applications would benefit from automatic morphological analysis of words, especially when dealing with morphologically rich languages. Con...
Oskar Kohonen, Sami Virpioja, Mikaela Klami
DAC
2008
ACM
15 years 3 months ago
IntellBatt: towards smarter battery design
Battery lifetime and safety are primary concerns in the design of battery operated systems. Lifetime management is typically supervised by the system via battery-aware task schedu...
Suman Kalyan Mandal, Praveen Bhojwani, Saraju P. M...
« Prev « First page 1744 / 1786 Last » Next »