Sciweavers

9325 search results - page 1496 / 1865
» The decentralized implementability problem
Sort
View
IJACT
2008
83views more  IJACT 2008»
15 years 5 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
ENTCS
2006
139views more  ENTCS 2006»
15 years 5 months ago
Improving the Usability of a Graph Transformation Language
Model transformation tools implemented using graph transformation techniques are often expected to provide high performance. For this reason, in the Graph Rewriting and Transforma...
Attila Vizhanyo, Sandeep Neema, Feng Shi, Daniel B...
ESE
2006
95views Database» more  ESE 2006»
15 years 5 months ago
Input validation analysis and testing
This research addresses the problem of statically analyzing input command syntax as defined in interface and requirements specifications and then generating test cases for dynamic ...
Jane Huffman Hayes, Jeff Offutt
FS
2006
84views more  FS 2006»
15 years 5 months ago
Iterative construction of the optimal Bermudan stopping time
Abstract. We present an iterative procedure for computing the optimal Bermudan stopping time, hence the Bermudan Snell envelope. The method produces an increasing sequence of appro...
Anastasia Kolodko, John Schoenmakers
IJNM
2008
112views more  IJNM 2008»
15 years 5 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
« Prev « First page 1496 / 1865 Last » Next »