Sciweavers

9425 search results - page 178 / 1885
» Some Notes on Models and Modelling
Sort
View
67
Voted
CADE
2008
Springer
15 years 10 months ago
Model Stack for the Pervasive Verification of a Microkernel-based Operating System
Abstract. Operating-system verification gains increasing research interest. The complexity of such systems is, however, challenging and many endeavors are limited in some respect: ...
Jan Dörrenbächer, Matthias Daum, Sebasti...
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
15 years 7 months ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl
73
Voted
ASIACRYPT
2009
Springer
15 years 4 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung
IUI
2004
ACM
15 years 3 months ago
Ontology modeling tool with concept dictionary
The usefulness of ontology is strongly dependent on the knowledge representation policy and its maintenance. The subject of knowledge representation and modeling tool has been one...
Yoichi Hiramatsu, Seiji Koide
83
Voted
DATE
2002
IEEE
95views Hardware» more  DATE 2002»
15 years 3 months ago
Window-Based Susceptance Models for Large-Scale RLC Circuit Analyses
Due to the increasing operating frequencies and the manner in which the corresponding integrated circuits and systems must be designed, the extraction, modeling and simulation of ...
Hui Zheng, Lawrence T. Pileggi, Michael W. Beattie...