Sciweavers

1288 search results - page 220 / 258
» On Analysis of Design Component Contracts: A Case Study
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 5 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
ATAL
2010
Springer
15 years 2 months ago
Parameterizing the winner determination problem for combinatorial auctions
Combinatorial auctions have been studied by the multiagent systems community for some time, since these auctions are an effective mechanism for resource allocation when agents are...
David Loker, Kate Larson
ISOLA
2010
Springer
14 years 12 months ago
LivingKnowledge: Kernel Methods for Relational Learning and Semantic Modeling
Latest results of statistical learning theory have provided techniques such us pattern analysis and relational learning, which help in modeling system behavior, e.g. the semantics ...
Alessandro Moschitti
JCS
2011
91views more  JCS 2011»
14 years 8 months ago
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
Gildas Avoine, Muhammed Ali Bingöl, Süle...
CSCW
2012
ACM
13 years 9 months ago
Between us and them: building connectedness within civic networks
Civic networks of community-based organizations face significant challenges in working together to combat issues facing their community (e.g., gang violence, sex trafficking). In ...
Jennifer Stoll, W. Keith Edwards, Kirsten A. Foot