Sciweavers

227 search results - page 32 / 46
» On the Reachability Problem in Cryptographic Protocols
Sort
View
108
Voted
CAV
2007
Springer
108views Hardware» more  CAV 2007»
15 years 6 months ago
Systematic Acceleration in Regular Model Checking
Abstract. Regular model checking is a form of symbolic model checking technique for systems whose states can be represented as finite words over a finite alphabet, where regular ...
Bengt Jonsson, Mayank Saksena
120
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding
—Wireless mesh networks have been widely deployed to provide broadband network access, and their performance can be significantly improved by using a new technology called netwo...
Tingting Chen, Sheng Zhong
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 1 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
78
Voted
FSTTCS
2009
Springer
15 years 7 months ago
Functionally Private Approximations of Negligibly-Biased Estimators
ABSTRACT. We study functionally private approximations. An approximation function g is functionally private with respect to f if, for any input x, g(x) reveals no more information ...
André Madeira, S. Muthukrishnan
79
Voted
PERCOM
2005
ACM
16 years 1 days ago
Toward Unlinkable ID Management for Multi-Service Environments
As pervasive computing environments become popular, ID devices, such as smart cards and RFID tags, introduce multi-service environments, in which a user can receive multiple servi...
Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura