Sciweavers

279 search results - page 20 / 56
» A Name Abstraction Functor for Named Sets
Sort
View
CSFW
2009
IEEE
14 years 3 months ago
Universally Composable Symmetric Encryption
For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities...
Ralf Küsters, Max Tuengerthal
SEKE
2009
Springer
14 years 3 months ago
Extending AOP to Support Broad Runtime Monitoring Needs
Abstract—Runtime monitoring, where some part of a program’s behavior and/or data is observed during execution, is a very useful technique that software developers to use for un...
Amjad Nusayr, Jonathan Cook
AOSE
2007
Springer
14 years 2 months ago
Tool-Supported Development with Tropos: The Conference Management System Case Study
Abstract. The agent-oriented software engineering methodology Tropos offers a structured development process and supporting tools for developing complex, distributed systems. The ...
Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alber...
BTW
2007
Springer
149views Database» more  BTW 2007»
14 years 2 months ago
Instance-based matching of hierarchical ontologies
Abstract: We study an instance-based approach for matching hierarchical ontologies, such as product catalogs. The motivation for utilizing instances is that metadata-based match ap...
Andreas Thor, Toralf Kirsten, Erhard Rahm
ADHOCNOW
2006
Springer
14 years 2 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou