Sciweavers

457 search results - page 59 / 92
» Distributed verification with LoLA
Sort
View
AMW
2010
13 years 9 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
CSREASAM
2008
13 years 9 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
DAGSTUHL
2008
13 years 9 months ago
The Grand Challenges and Myths of Neural-Symbolic Computation
The construction of computational cognitive models integrating the connectionist and symbolic paradigms of artificial intelligence is a standing research issue in the field. The co...
Luís C. Lamb
IIWAS
2008
13 years 9 months ago
WEB-PerformCharts: a collaborative web-based tool for test case generation from statecharts
Distributed development of software has turned into a natural and modern approach where teams spread over the world cooperate to develop a software product, and this has become po...
Alessandro Oliveira Arantes, Nandamudi Lankalapall...
FIW
2000
114views Communications» more  FIW 2000»
13 years 9 months ago
Feature Interaction in Internet Telephony
While Internet telephony aims to provide services at least equal to traditional telephony, the architecture of Internet telephony is sufficiently different to make it necessary to ...
Jonathan Lennox, Henning Schulzrinne