Sciweavers

285 search results - page 55 / 57
» Relating two formal models of path-vector routing
Sort
View
DOCENG
2003
ACM
15 years 2 months ago
Methods for the semantic analysis of document markup
We present an approach on how to investigate what kind of semantic information is regularly associated with the structural markup of scientific articles. This approach addresses ...
Petra Saskia Bayerl, Harald Lüngen, Daniela G...
CAISE
2006
Springer
15 years 1 months ago
Bridging the Gap between Data Warehouses and Organizations
Abstract. Data Warehouse (DWH) systems are used by decision makers for performance measurement and decision support. Currently the main focus of the DWH research field is not as mu...
Veronika Stefanov
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
IJFCS
2006
106views more  IJFCS 2006»
14 years 9 months ago
A Timed Failure Equivalence Preserving Abstraction for Parametric Time-interval Automata
ion for Parametric Time-Interval Automata Akio Nakata, Tadaaki Tanimoto, Suguru Sasaki, Teruo Higashino Department of Information Networking, Graduate School of Information Science...
Akio Nakata, Tadaaki Tanimoto, Suguru Sasaki, Teru...
SIGSOFT
2006
ACM
15 years 10 months ago
SYNERGY: a new algorithm for property checking
We consider the problem if a given program satisfies a specified safety property. Interesting programs have infinite state spaces, with inputs ranging over infinite domains, and f...
Bhargav S. Gulavani, Thomas A. Henzinger, Yamini K...