Sciweavers

60 search results - page 10 / 12
» A Parallel between Extended Formal Concept Analysis and Bipa...
Sort
View
ATAL
2007
Springer
14 years 1 months ago
Routing games with an unknown set of active players
In many settings there exists a set of potential participants, but the set of participants who are actually active in the system, and in particular their number, is unknown. This ...
Itai Ashlagi, Dov Monderer, Moshe Tennenholtz
JOT
2006
113views more  JOT 2006»
13 years 7 months ago
Constraint Validation in Model Compilers
Model transformation has become one of the most focused research field, motivated by for instance the OMG's Model-Driven Architecture (MDA). Metamodeling is a central techniq...
László Lengyel, Tihamer Levendovszky...
CSL
2010
Springer
13 years 8 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
RFIDSEC
2010
13 years 6 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
JMIV
2006
72views more  JMIV 2006»
13 years 7 months ago
The Uncertainty Principle: Group Theoretic Approach, Possible Minimizers and Scale-Space Properties
The uncertainty principle is a fundamental concept in the context of signal and image processing, just as much as it has been in the framework of physics and more recently in harmo...
Chen Sagiv, Nir A. Sochen, Yehoshua Y. Zeevi