136 views125 votes15 years 7 months ago VOTEID 2007»
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
255 views108 votes15 years 6 months ago SIGMOD 2010»
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
166 views95 votes15 years 8 months ago EDBTW 2010»
Graph composition has applications in a variety of practical applications. In drug development, for instance, in order to understand possible drug interactions, one has to merge k...
213 views127 votes14 years 11 months ago IMC 2010»
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
139 views117 votes15 years 6 months ago PDCAT 2005»
Recently a bulk of research [14, 5, 15, 9] has been done on the modelling of the smallworld phenomenon, which has been shown to be pervasive in social and nature networks, and eng...
239 views132 votes15 years 6 months ago HYBRID 2010»
This paper addresses the problem of self localization of mobile devices. In particular, each device combines noisy measurements of its absolute position with distance measurements...
104 views83 votes15 years 7 months ago CIMCA 2006»
Abstract. We describe Scusi?, a multi-stage, spoken language interpretation mechanism designed to be part of a robot-mounted dialogue system. Scusi?’s interpretation process maps...
191 views134 votes14 years 1 months ago CRYPTO 2011»
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
147 views105 votes15 years 1 months ago IJSN 2008»
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Event-driven systems are used in a wide range of applications such as responding to missile attacks, interdicting potential terrorists, exploiting arbitrage opportunities and resp...