Sciweavers

738 search results - page 109 / 148
» cases 2001
Sort
View
88
Voted
CAV
2001
Springer
119views Hardware» more  CAV 2001»
15 years 2 months ago
Certifying Model Checkers
Model Checking is an algorithmic technique to determine whether a temporal property holds of a program. For linear time properties, a model checker produces a counterexample comput...
Kedar S. Namjoshi
CCS
2001
ACM
15 years 2 months ago
Delegation of cryptographic servers for capture-resilient devices
Abstract. A device that performs private key operations (signatures or decryptions), and whose private key operations are protected by a password, can be immunized against offline...
Philip D. MacKenzie, Michael K. Reiter
CIA
2001
Springer
15 years 2 months ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt
CIKM
2001
Springer
15 years 2 months ago
The Effectiveness of Query Expansion for Distributed Information Retrieval
Query expansion has been shown effective for both single database retrieval and for distributed information retrieval where complete collection information is available. One might...
Paul Ogilvie, James P. Callan
CIKM
2001
Springer
15 years 2 months ago
Caching Constrained Mobile Data
As mobile devices get ubiquitous and grow in computational power, their management of interdependent data also becomes increasingly important. The mobile environment exhibits all ...
Subhasish Mazumdar, Mateusz Pietrzyk, Panos K. Chr...