Sciweavers

931 search results - page 133 / 187
» aim 2005
Sort
View
ICALP
2005
Springer
15 years 3 months ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi
ICALP
2005
Springer
15 years 3 months ago
Spatial Logics for Bigraphs
Bigraphs are emerging as a (meta-)model for concurrent calculi, like CCS, ambients, πcalculus, and Petri nets. They are built orthogonally on two structures: a hierarchical place...
Giovanni Conforti, Damiano Macedonio, Vladimiro Sa...
ICCS
2005
Springer
15 years 3 months ago
Effectiveness of Vaccination Strategies for Infectious Diseases According to Human Contact Networks
A ‘contact network’ modeling infection transmission comprises of nodes (or individuals) that are linked when they are in contact that possibly transmits an infection. We here s...
Fumihiko Takeuchi, Kenji Yamamoto
ICLP
2005
Springer
15 years 3 months ago
An Optimised Semantic Web Query Language Implementation in Prolog
The Semantic Web is a rapidly growing research area aiming at the exchange of semantic information over the World Wide Web. The Semantic Web is built on top of RDF, an XML-based ex...
Jan Wielemaker
ICNC
2005
Springer
15 years 3 months ago
Drawing Undirected Graphs with Genetic Algorithms
This paper proposes an improved genetic algorithm for producing aesthetically pleasing drawings of general undirected graphs. Previous undirected graph drawing algorithms draw larg...
Qing-Guo Zhang, Huayong Liu, Wei Zhang, Ya-Jun Guo