Sciweavers

620 search results - page 60 / 124
» Concrete Abstractions
Sort
View
FSE
2004
Springer
150views Cryptology» more  FSE 2004»
14 years 3 months ago
Ciphers Secure against Related-Key Attacks
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the secu...
Stefan Lucks
SEM
2004
Springer
14 years 3 months ago
Accuracy of Performance Prediction for EJB Applications: A Statistical Analysis
Abstract. A challenging software engineering problem is the design and implementation of component-based (CB) applications that can meet specified performance requirements. Our PPC...
Yan Liu, Ian Gorton
TCC
2004
Springer
118views Cryptology» more  TCC 2004»
14 years 3 months ago
A General Composition Theorem for Secure Reactive Systems
Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ICRA
2003
IEEE
109views Robotics» more  ICRA 2003»
14 years 3 months ago
Narrative situation assessment for human-robot interaction
Abstract— In this paper we address the problem of interpreting sensory data for human-robot interaction, especially when gathered from several robots at the same time. After desc...
Björn Jensen, Roland Philippsen, Roland Siegw...
DALT
2003
Springer
14 years 3 months ago
Modeling Interactions Using Social Integrity Constraints: A Resource Sharing Case Study
Computees are abstractions of the entities that populate global and open computing environments. The societies that they populate give an institutional meaning to their interaction...
Marco Alberti, Marco Gavanelli, Evelina Lamma, Pao...