Sciweavers

2612 search results - page 455 / 523
» Semantic Attention Management
Sort
View
ASIACRYPT
2005
Springer
15 years 7 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
CAV
2005
Springer
129views Hardware» more  CAV 2005»
15 years 7 months ago
Symbolic Systems, Explicit Properties: On Hybrid Approaches for LTL Symbolic Model Checking
In this work we study hybrid approaches to LTL symbolic model checking; that is, approaches that use explicit representations of the property automaton, whose state space is often ...
Roberto Sebastiani, Stefano Tonetta, Moshe Y. Vard...
ERCIMDL
2005
Springer
148views Education» more  ERCIMDL 2005»
15 years 7 months ago
Active Support for Query Formulation in Virtual Digital Libraries: A Case Study with DAFFODIL
Daffodil is a front-end to federated, heterogeneous digital libraries targeting at strategic support of users during the information seeking process. This is done by offering a va...
André Schaefer, Matthias Jordan, Claus-Pete...
EUC
2005
Springer
15 years 7 months ago
Distributed Contextual Information Storage Using Content-Centric Hash Tables
We analyze the problem of storing contextual information across a set of distributed heterogeneous mobile devices. These devices form a Mobile Ad Hoc Network (MANET) interconnected...
Ignacio Nieto-Carvajal, Juan A. Botía, Pedr...
GCC
2005
Springer
15 years 7 months ago
The Architecture and Implementation of Resource Space Model System
Resource Space Model (RSM) is a semantic model to manage and share heterogeneous resources on the Internet. This paper focuses on the general architecture, physical implementation ...
Peng Shi, Yunpeng Xing, Erlin Yao, Zhen Wang, Kehu...