Sciweavers

9325 search results - page 1646 / 1865
» The decentralized implementability problem
Sort
View
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 7 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
CASES
2001
ACM
15 years 7 months ago
Storage allocation for embedded processors
In an embedded system, it is common to have several memory areas with different properties, such as access time and size. An access to a specific memory area is usually restricted...
Jan Sjödin, Carl von Platen
148
Voted
ICDCS
2010
IEEE
15 years 7 months ago
Deployment of a Reinforcement Backbone Network with Constraints of Connection and Resources
In recent years, we have seen a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multi-hop w...
Peng Wei, Shan Chu, Xin Wang, Yu Zhou
IEAAIE
2000
Springer
15 years 7 months ago
Maintenance of KBS's by Domain Experts: The Holy Grail in Practice
Enabling a domain expert to maintain his own knowledge in a Knowledge Based System has long been an ideal for the Knowledge Engineering community. In this paper we report on our ex...
Arne Bultmann, Joris Kuipers, Frank van Harmelen
122
Voted
MICAI
2000
Springer
15 years 7 months ago
Searching for a Solution to Program Verification=Equation Solving in CCS
Unique Fixpoint Induction, UFI, is a chief inference rule to prove the equivalence of recursive processes in CCS [7]. It plays a major role in the equational approach to verificati...
Raul Monroy, Alan Bundy, Ian Green
« Prev « First page 1646 / 1865 Last » Next »