Sciweavers

332 search results - page 43 / 67
» adhoc 2008
Sort
View
CTRSA
2008
Springer
113views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Aggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on ...
Jonathan Katz, Andrew Y. Lindell
DEXA
2008
Springer
98views Database» more  DEXA 2008»
14 years 11 months ago
REALM: Replication of Data for a Logical Group Based MANET Database
Abstract. Mobile Ad-Hoc Networks, or MANETs, provide communication between free-roaming mobile hosts without a fixed infrastructure. These MANETs operate under conditions of limite...
Anita Vallur, Le Gruenwald, Nick Hunter
ERCIMDL
2008
Springer
111views Education» more  ERCIMDL 2008»
14 years 11 months ago
Distributed Preservation Services: Integrating Planning and Actions
Digital preservation has turned into an active field of research. The most prominent approaches today are migration and emulation; especially considering migration, a range of work...
Christoph Becker, Miguel Ferreira, Michael Kraxner...
ESWS
2008
Springer
14 years 11 months ago
Semantic Email as a Communication Medium for the Social Semantic Desktop
In this paper, we introduce a formal email workflow model based on traditional email, which enables the user to define and execute ad-hoc workflows in an intuitive way. This model ...
Simon Scerri, Siegfried Handschuh, Stefan Decker
CORR
2008
Springer
75views Education» more  CORR 2008»
14 years 10 months ago
Inductive and Coinductive Components of Corecursive Functions in Coq
In Constructive Type Theory, recursive and corecursive definitions are subject to syntactic restrictions which guarantee termination for recursive functions and productivity for c...
Yves Bertot, Ekaterina Komendantskaya