Sciweavers

2830 search results - page 258 / 566
» No Science without Semantics
Sort
View
ACSC
2003
IEEE
15 years 9 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
FOCS
2003
IEEE
15 years 9 months ago
Towards a Characterization of Truthful Combinatorial Auctions
This paper analyzes implementable social choice functions (in dominant strategies) over restricted domains of preferences, the leading example being combinatorial auctions. Our wo...
Ron Lavi, Ahuva Mu'alem, Noam Nisan
FOCS
2003
IEEE
15 years 9 months ago
Zero-Knowledge Sets
We show how a polynomial-time prover can commit to an arbitrary finite set Ë of strings so that, later on, he can, for any string Ü, reveal with a proof whether Ü ¾ Ë or Ü ...
Silvio Micali, Michael O. Rabin, Joe Kilian
GI
2003
Springer
15 years 9 months ago
Active Data Protection with Data Journals
: A major privacy problem on the internet is the unrestricted sharing of user data between services and other parties. The EU privacy legislation grants the user the rights to rest...
Lars Brückner, Jan Steffan, Wesley Terpstra, ...
GI
2003
Springer
15 years 9 months ago
New Software Technology in Space: BOSS - a Dependable Open Source Embedded Operating System
: BOSS targets a principle which the world forgot a long time ago: Simplicity. BOSS is an embedded real time operating system for safety critical applications. Our experience shows...
Sergio Montenegro