Sciweavers

793 search results - page 150 / 159
» Argumentation and standards of proof
Sort
View
ICYCS
2008
IEEE
14 years 1 months ago
Trustworthiness and Quality of Context Information
Context-aware service platforms use context information to customize their services to the current users’ situation. Due to technical limitations in sensors and context reasonin...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
14 years 1 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
FOCS
2007
IEEE
14 years 1 months ago
Covert Multi-Party Computation
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...
Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, ...
RTSS
2007
IEEE
14 years 1 months ago
Integrating Adaptive Components: An Emerging Challenge in Performance-Adaptive Systems and a Server Farm Case-Study
The increased complexity of performance-sensitive software systems leads to increased use of automated adaptation policies in lieu of manual performance tuning. Composition of ada...
Jin Heo, Dan Henriksson, Xue Liu, Tarek F. Abdelza...
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
14 years 1 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu