Sciweavers

5344 search results - page 303 / 1069
» Privacy-Preserving Set Operations
Sort
View
CSFW
2010
IEEE
15 years 8 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
FM
2009
Springer
169views Formal Methods» more  FM 2009»
15 years 8 months ago
Model Checking Linearizability via Refinement
Abstract. Linearizability is an important correctness criterion for implementations of concurrent objects. Automatic checking of linearizability is challenging because it requires ...
Yang Liu 0003, Wei Chen, Yanhong A. Liu, Jun Sun 0...
ICDCS
2007
IEEE
15 years 8 months ago
Communication-Efficient Tracking of Distributed Cumulative Triggers
In recent work, we proposed D-Trigger, a framework for tracking a global condition over a large network that allows us to detect anomalies while only collecting a very limited amo...
Ling Huang, Minos N. Garofalakis, Anthony D. Josep...
3DPVT
2004
IEEE
101views Visualization» more  3DPVT 2004»
15 years 8 months ago
Pyramid Coordinates for Morphing and Deformation
Many model editing operations, such as morphing, blending, and shape deformation, require the ability to interactively transform the surface of a model in response to some control...
Alla Sheffer, Vladislav Kraevoy
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
15 years 8 months ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto