Sciweavers

930 search results - page 73 / 186
» A Universal Encryption Standard
Sort
View
LICS
2003
IEEE
14 years 3 months ago
An NP Decision Procedure for Protocol Insecurity with XOR
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
Yannick Chevalier, Ralf Küsters, Michaël...
MM
2003
ACM
262views Multimedia» more  MM 2003»
14 years 3 months ago
ARMS: adaptive rich media secure streaming
In this demonstration we present the ARMS system which enables secure and adaptive rich media streaming to a large-scale, heterogeneous client population. The ARMS system dynamica...
Lisa Amini, Raymond Rose, Chitra Venkatramani, Oli...
SIGCSE
2010
ACM
132views Education» more  SIGCSE 2010»
14 years 4 months ago
Undergraduate computer science education in China
This paper examines the current status of professional computing education for undergraduate majors and fundamental computer education for non-majors in China. We describe the evo...
Ming Zhang, Virginia Mary Lo
OTM
2007
Springer
14 years 4 months ago
An Evaluation of Triple-Store Technologies for Large Data Stores
Abstract. This paper presents a comparison of performance of various triplestore technologies currently in either production release or beta test. Our comparison of triple-store te...
Kurt Rohloff, Mike Dean, Ian Emmons, Dorene Ryder,...
IFIP
1997
Springer
14 years 2 months ago
Representing a body of knowledge for teaching, learning and assessment
: National and international standards for professional groups may become a dominant and governing force as internet-based professional training becomes universally accepted. Educa...
Don Sheridan, David White