Sciweavers

866 search results - page 76 / 174
» A Formal Investigation of
Sort
View
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
13 years 12 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
FOIS
2006
13 years 11 months ago
Towards an ontology of agency and action From STIT to OntoSTIT+
Abstract. A variety of disciplines and research areas have separately studied the notions of action, agents and agency, but no integrated and well-developed formal ontology for the...
Nicolas Troquard, Robert Trypuz, Laure Vieu
ECAI
2010
Springer
13 years 11 months ago
Linear Logic for Non-Linear Storytelling
Whilst narrative representations have played a prominent role in AI research, there has been a renewed interest in the topic with the development of interactive narratives. A typic...
Anne-Gwenn Bosser, Marc Cavazza, Ronan Champagnat
GG
2008
Springer
13 years 11 months ago
Adaptive Star Grammars for Graph Models
Abstract. Adaptive star grammars generalize well-known graph grammar formalisms based on hyperedge and node replacement while retaining, e.g., parseability and the commutativity an...
Frank Drewes, Berthold Hoffmann, Mark Minas
FMICS
2010
Springer
13 years 10 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó