Sciweavers

4716 search results - page 665 / 944
» Tangible functional programming
Sort
View
ICALP
2007
Springer
15 years 5 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
ICN
2007
Springer
15 years 5 months ago
Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access Networks
— In this paper, we use the Markov Decision Process (MDP) technique to find the optimal code allocation policy in High-Speed Downlink Packet Access (HSDPA) networks. A discrete ...
Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadar...
IFIP
2007
Springer
15 years 5 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
IFIP
2007
Springer
15 years 5 months ago
Towards UML-Intensive Framework for Model-Driven Development
The paper describes a conceptual framework for model-driven development based on concise application of UML and modeling tool functionality. A case study of modeling software for l...
Darius Silingas, Ruslanas Vitiutinas
IFIP
2007
Springer
15 years 5 months ago
Identity as a Service - Towards a Service-Oriented Identity Management Architecture
Service-oriented architecture (SOA) will form the basis of future information systems. Web services are a promising way to implement SOA enabling the loose coupling of functionalit...
Christian Emig, Frank Brandt, Sebastian Kreuzer, S...