Sciweavers

4689 search results - page 828 / 938
» Analysis and modeling of control tasks in dynamic systems
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
FROCOS
2007
Springer
14 years 2 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ADVIS
2000
Springer
14 years 15 days ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman
ESANN
2008
13 years 9 months ago
Phase transitions in Vector Quantization
Abstract. We study Winner-Takes-All and rank based Vector Quantization along the lines of the statistical physics of off-line learning. Typical behavior of the system is obtained w...
Aree Witoelar, Anarta Ghosh, Michael Biehl
SI3D
1997
ACM
14 years 10 days ago
Two-Handed Direct Manipulation on the Responsive Workbench
We have built a system that allows users to naturally manipulate virtual 3D models with both hands on the Responsive Workbench, a tabletop VR device. Our design is largely based u...
Lawrence D. Cutler, Bernd Fröhlich, Pat Hanra...