Sciweavers

3565 search results - page 574 / 713
» Modeling a system controller for timing analysis
Sort
View
135
Voted
AINA
2007
IEEE
15 years 10 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
FROCOS
2007
Springer
15 years 10 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ADVIS
2000
Springer
15 years 8 months ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman
ESANN
2008
15 years 5 months ago
Phase transitions in Vector Quantization
Abstract. We study Winner-Takes-All and rank based Vector Quantization along the lines of the statistical physics of off-line learning. Typical behavior of the system is obtained w...
Aree Witoelar, Anarta Ghosh, Michael Biehl
ENTCS
2006
146views more  ENTCS 2006»
15 years 4 months ago
Formalizing WSBPEL Business Processes Using Process Algebra
Industry standards for Web Service composition, such as WSBPEL, provide the notation and additional control mechanisms for the execution of business processes in Web Service colla...
Javier Cámara, Carlos Canal, Javier Cubo, A...