Sciweavers

2432 search results - page 420 / 487
» Cryptographic logical relations
Sort
View
MIDDLEWARE
2007
Springer
15 years 10 months ago
Life cycle support for sensor network applications
Developing applications for sensor networks is a challenging task. Most programming systems narrowly focus on programming issues while ignoring that programming represents only a ...
Urs Bischoff, Gerd Kortuem
PREMI
2007
Springer
15 years 10 months ago
Rough Set Theory of Pattern Classification in the Brain
Humans effortlessly classify and recognize complex patterns even if their attributes are imprecise and often inconsistent. It is not clear how the brain processes uncertain visual ...
Andrzej W. Przybyszewski
SEMWEB
2007
Springer
15 years 10 months ago
Instance Migration in Heterogeneous Ontology Environments
In this paper we address the problem of migrating instances between heterogeneous overlapping ontologies. The instance migration problem arises when one wants to reclassify a set o...
Luciano Serafini, Andrei Tamilin
SOFSEM
2007
Springer
15 years 10 months ago
Explicit Connectors in Component Based Software Engineering for Distributed Embedded Systems
Abstract. The increasing complexity of today’s embedded systems applications imposes the requirements and constraints of distributed, heterogeneous subsystem interaction to softw...
Dietmar Schreiner, Karl M. Göschka
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 10 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani