Sciweavers

2165 search results - page 341 / 433
» cases 2005
Sort
View
PPDP
2005
Springer
15 years 3 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...
PPSWR
2005
Springer
15 years 3 months ago
A Geospatial World Model for the Semantic Web
The Semantic Web is an endeavour aiming at enhancing Web data with meta-data and data processing, as well as processing methods specifying the “meaning” of such data and allowi...
François Bry, Bernhard Lorenz, Hans Jü...
PROFES
2005
Springer
15 years 3 months ago
Investigating the Impact of Active Guidance on Design Inspection
Software inspection helps to improve the quality of software products early in the development process. For design inspection recent research showed that usage-based reading of doc...
Dietmar Winkler, Stefan Biffl, Bettina Thurnher
PVM
2005
Springer
15 years 3 months ago
Implementing MPI-IO Shared File Pointers Without File System Support
Abstract. The ROMIO implementation of the MPI-IO standard provides a portable infrastructure for use on top of any number of different underlying storage targets. These targets va...
Robert Latham, Robert B. Ross, Rajeev Thakur, Bria...
QOSIP
2005
Springer
15 years 3 months ago
Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach
In this paper, we present a novel approach to the congestion control and resource allocation problem of elastic and real-time traffic in telecommunication networks. With the concep...
Tobias Harks