Sciweavers

11436 search results - page 274 / 2288
» Modeling Real Reasoning
Sort
View
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
134
Voted
ESWS
2008
Springer
15 years 5 months ago
Simplifying the Web Service Discovery Process
One of the crucial reasons for adding semantic descriptions to Web services is to enable intelligent discovery, removing the need for a human to manually search and browse textual ...
Nathalie Steinmetz, Mick Kerrigan, Holger Lausen, ...
132
Voted
ADHOC
2008
135views more  ADHOC 2008»
15 years 3 months ago
Rapid design and evaluation framework for wireless sensor networks
The diversity of applications and typically scarce node resources set very tight constraints to Wireless Sensor Networks (WSN). It is not possible to fulfill all requirements with...
Mauri Kuorilehto, Marko Hännikäinen, Tim...
132
Voted
ISSRE
2010
IEEE
15 years 2 months ago
DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing
—Web 2.0 applications are increasing in popularity. However, they are also prone to errors because of their dynamic nature. This paper presents DoDOM, an automated system for tes...
Karthik Pattabiraman, Benjamin G. Zorn
140
Voted
ATAL
2009
Springer
15 years 1 months ago
Replicator Dynamics for Multi-agent Learning: An Orthogonal Approach
Today's society is largely connected and many real life applications lend themselves to be modeled as multi-agent systems. Although such systems as well as their models are d...
Michael Kaisers, Karl Tuyls