Sciweavers

2702 search results - page 281 / 541
» Practically Applicable Formal Methods
Sort
View
103
Voted
SCN
2010
Springer
138views Communications» more  SCN 2010»
15 years 1 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
16 years 4 months ago
SUBSKY: Efficient Computation of Skylines in Subspaces
Given a set of multi-dimensional points, the skyline contains the best points according to any preference function that is monotone on all axes. In practice, applications that req...
Yufei Tao, Xiaokui Xiao, Jian Pei
CCS
2009
ACM
16 years 3 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
125
Voted
KDD
2009
ACM
202views Data Mining» more  KDD 2009»
16 years 3 months ago
Correlated itemset mining in ROC space: a constraint programming approach
Correlated or discriminative pattern mining is concerned with finding the highest scoring patterns w.r.t. a correlation measure (such as information gain). By reinterpreting corre...
Siegfried Nijssen, Tias Guns, Luc De Raedt
CHI
2005
ACM
16 years 3 months ago
MultiView: spatially faithful group video conferencing
MultiView is a new video conferencing system that supports collaboration between remote groups of people. MultiView accomplishes this by being spatially faithful. As a result, Mul...
David T. Nguyen, John F. Canny