Sciweavers

1230 search results - page 101 / 246
» On Abstraction in Scenarios
Sort
View
GI
2009
Springer
15 years 1 months ago
Classifying Privacy and Verifiability Requirements for Electronic Voting
Abstract: Voter privacy and verifiability are fundamental security concepts for electronic voting. Existing literature on electronic voting provides many definitions and interpreta...
Lucie Langer, Axel Schmidt, Melanie Volkamer, Joha...
GLOBECOM
2009
IEEE
15 years 1 months ago
Block Diagonalization in the MIMO Broadcast Channel with Delayed CSIT
Abstract-- This paper investigates the impact of delayed channel state information at the transmitter (CSIT) on the MIMO broadcast channel with block diagonalization (BD) precoding...
Jun Zhang, Jeffrey G. Andrews, Robert W. Heath Jr.
CP
2006
Springer
15 years 1 months ago
Constraint Based Resilience Analysis
Abstract. In this paper we give an overview of applications of Constraint Programming for IP (Internet Protocol) data networks, and discuss the problem of Resilience Analysis in mo...
Helmut Simonis
ECTEL
2006
Springer
15 years 1 months ago
Rethinking the Use of Ontologies in Learning
Abstract. This paper investigates the use of ontologies in processes of collaborative learning and knowledge generation. The creation and use of ontologies is analysed from an acti...
Heidrun Allert, Hannu Markkanen, Christoph Richter
INFOCOM
2000
IEEE
15 years 1 months ago
Windowed Certificate Revocation
Abstract--The advent of electronic commerce and personal communications on the Internet heightens concerns over the lack of privacy and security. Network services providing a wide ...
Patrick Drew McDaniel, Sugih Jamin