Sciweavers

68 search results - page 11 / 14
» Design and Primitive Specification for Shannon
Sort
View
EURONGI
2006
Springer
13 years 10 months ago
The Challenges of Merging Two Similar Structured Overlays: A Tale of Two Networks
Structured overlay networks is an important and interesting primitive that can be used by diverse peer-to-peer applications. Multiple overlays can result either because of network ...
Anwitaman Datta, Karl Aberer
FOSAD
2000
Springer
13 years 10 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
13 years 4 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
COLING
2010
13 years 1 months ago
E-HowNet and Automatic Construction of a Lexical Ontology
In this paper, we propose a lexical senses representation system called E-HowNet, in which the lexical senses are defined by basic concepts. As a result, the meanings of expressio...
Wei-Te Chen, Su-Chu Lin, Shu-Ling Huang, You-Shan ...
SIGSOFT
2007
ACM
14 years 7 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...