Sciweavers

816 search results - page 137 / 164
» Practical Multi-level Modeling on MOF-compliant Modeling Fra...
Sort
View
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 3 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
VLDB
2005
ACM
165views Database» more  VLDB 2005»
15 years 3 months ago
Semantic Adaptation of Schema Mappings when Schemas Evolve
Schemas evolve over time to accommodate the changes in the information they represent. Such evolution causes invalidation of various artifacts depending on the schemas, such as sc...
Cong Yu, Lucian Popa
FASE
2004
Springer
15 years 3 months ago
Checking Absence of Illicit Applet Interactions: A Case Study
Abstract. This paper presents the use of a method – and its corresponding tool set – for compositional verification of applet interactions on a realistic industrial smart card...
Marieke Huisman, Dilian Gurov, Christoph Sprenger,...
ATAL
2003
Springer
15 years 3 months ago
Formal semantics and communication strategies for proactive information delivery among team-based agents
Effective human teams often benefit from proactivity through members’ capability of anticipating different needs of teammates. In this paper, we focus on three issues related...
John Yen, Xiaocong Fan, Shuang Sun, Rui Wang, Cong...
COCOON
2003
Springer
15 years 3 months ago
Genomic Distances under Deletions and Insertions
As more and more genomes are sequenced, evolutionary biologists are becoming increasingly interested in evolution at the level of whole genomes, in scenarios in which the genome ev...
Mark Marron, Krister M. Swenson, Bernard M. E. Mor...