Sciweavers

114 search results - page 13 / 23
» Recognizing Balanceable Matrices
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 6 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
96
Voted
ACTA
2010
191views more  ACTA 2010»
14 years 11 months ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar
ICSE
2003
IEEE-ACM
15 years 11 months ago
Experiences from the Architectural Change Process
A good software architecture is becoming recognized as a major factor for successful products. There has been much research on the technical aspects of software architecture and i...
Josef Nedstam, Even-André Karlsson, Martin ...
88
Voted
HUC
2007
Springer
15 years 5 months ago
Tracking Free-Weight Exercises
Weight training, in addition to aerobic exercises, is an important component of a balanced exercise program. However, mechanisms for tracking free weight exercises have not yet bee...
Keng-hao Chang, Mike Y. Chen, John Canny
TDSC
2010
172views more  TDSC 2010»
14 years 6 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...