Sciweavers

49 search results - page 7 / 10
» uc 2007
Sort
View
ICALP
2007
Springer
14 years 11 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
FOCS
2007
IEEE
15 years 3 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
BIS
2006
105views Business» more  BIS 2006»
14 years 11 months ago
Describing Business Processes with Use Cases
Business processes can be described with diagrams, e.g. BPMN diagrams, or as text. Use cases are a text-based notation. They are semiformal: a business process is expressed as a s...
Jerzy R. Nawrocki, Tomasz Nedza, Miroslaw Ochodek,...
CEC
2007
IEEE
15 years 3 months ago
Directed intervention crossover applied to bio-control scheduling
—This paper describes two directed intervention crossover approaches that are applied to a bio-control dynamic system. Unlike traditional uniform crossover, both the Calculated E...
Paul M. Godley, David E. Cairns, Julie Cowie
MOBIQUITOUS
2007
IEEE
15 years 3 months ago
A Wireless Sensor Network and Incident Command Interface for Urban Firefighting
­The Fire Information and Rescue Equipment project  at  UC  Berkeley  has  developed  a  prototype  wireless  sensor  network (WSN) and Incident Command (IC)...
Joel Wilson, Vikas Bhargava, Andrew Redfern, Paul ...