Sciweavers

18769 search results - page 3749 / 3754
» Requirements Models in Context
Sort
View
ASIACRYPT
2011
Springer
13 years 9 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
105
Voted
ATAL
2011
Springer
13 years 9 months ago
Decomposing constraint systems: equivalences and computational properties
Distributed systems can often be modeled as a collection of distributed (system) variables whose values are constrained by a set of constraints. In distributed multi-agent systems...
Wiebe van der Hoek, Cees Witteveen, Michael Wooldr...
CCS
2011
ACM
13 years 9 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
CIKM
2011
Springer
13 years 9 months ago
Semantic data markets: a flexible environment for knowledge management
We present Nyaya, a system for the management of Semantic-Web data which couples a general-purpose and extensible storage mechanism with efficient ontology reasoning and querying ...
Roberto De Virgilio, Giorgio Orsi, Letizia Tanca, ...
CRV
2011
IEEE
305views Robotics» more  CRV 2011»
13 years 9 months ago
Motion Segmentation by Learning Homography Matrices from Motor Signals
—Motion information is an important cue for a robot to separate foreground moving objects from the static background world. Based on the observation that the motion of the backgr...
Changhai Xu, Jingen Liu, Benjamin Kuipers
« Prev « First page 3749 / 3754 Last » Next »