Sciweavers

4762 search results - page 898 / 953
» About the use of protein models
Sort
View
WS
2005
ACM
14 years 3 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
CCS
2005
ACM
14 years 3 months ago
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
The NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of cryptographic protocols that has been used with great effect on a number of complex real-l...
Santiago Escobar, Catherine Meadows, José M...
FC
2005
Springer
97views Cryptology» more  FC 2005»
14 years 3 months ago
Time Capsule Signature
Abstract. We introduce a new cryptographic problem called time capsule signature. Time capsule signature is a ‘future signature’ that becomes valid from a specific future time...
Yevgeniy Dodis, Dae Hyun Yum
FSMNLP
2005
Springer
14 years 3 months ago
German Compound Analysis with wfsc
Compounding is a very productive process in German to form complex nouns and adjectives which represent about 7% of the words of a newspaper text. Unlike English, German compounds ...
Anne Schiller
TCGOV
2005
Springer
14 years 3 months ago
Participatory Budget Formation Through the Web
Abstract. We describe a web-based system to support groups in elaborating participatory budgets. Rather than using physical meetings with voting mechanisms, we promote virtual meet...
Jesus Rios, David Ríos Insua, E. Fernandez,...