Sciweavers

1297 search results - page 166 / 260
» fews 2007
Sort
View
SSD
2007
Springer
133views Database» more  SSD 2007»
15 years 3 months ago
Compression of Digital Road Networks
Abstract. In the consumer market, there has been an increasing interest in portable navigation systems in the last few years. These systems usually work on digital map databases st...
Jonghyun Suh, Sungwon Jung, Martin Pfeifle, Khoa T...
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 3 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
UIC
2007
Springer
15 years 3 months ago
A Peer-to-Peer Semantic-Based Service Discovery Method for Pervasive Computing Environment
The paper proposes a novel distributed service discovery method for the pervasive computing environment. The method is based on the concept of small world, policy-based advertiseme...
Baopeng Zhang, Yuanchun Shi, Xin Xiao
VAMOS
2007
Springer
15 years 3 months ago
FAMA: Tooling a Framework for the Automated Analysis of Feature Models
The automated analysis of feature models is recognized as one of the key challenges for automated software development in the context of Software Product Lines (SPL). However, aft...
David Benavides, Sergio Segura, Pablo Trinidad, An...
WAIFI
2007
Springer
110views Mathematics» more  WAIFI 2007»
15 years 3 months ago
On Kabatianskii-Krouk-Smeets Signatures
Kabastianskii, Krouk and Smeets proposed in 1997 a digital signature scheme based on random error-correcting codes. In this paper we investigate the security and the efficiency of ...
Pierre-Louis Cayrel, Ayoub Otmani, Damien Vergnaud