Sciweavers

322 search results - page 58 / 65
» Entity Authentication and Key Distribution
Sort
View
MODELS
2007
Springer
14 years 2 months ago
Modeling Time(s)
Abstract. Time and timing features are an important aspect of modern electronic systems, often of embedded nature. We argue here that in early design phases, time is often of logic...
Charles André, Frédéric Malle...
SAC
2004
ACM
14 years 1 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
IJCNLP
2004
Springer
14 years 1 months ago
Window-Based Method for Information Retrieval
In this paper, a series of window-based methods is proposed for information retrieval. Compared with traditional tf-idf model, our approaches are based on two new key notions. The ...
Qianli Jin, Jun Zhao, Bo Xu
DAIS
2001
13 years 9 months ago
Software Connectors and their Role in Component Deployment
To support rapid software evolution, it is desirable to construct software systems from reusable components. In this approach, the architecture of a system is described as a collec...
Dusan Bálek, Frantisek Plasil
USENIX
2008
13 years 10 months ago
Large-scale Virtualization in the Emulab Network Testbed
Network emulation is valuable largely because of its ability to study applications running on real hosts and "somewhat real" networks. However, conservatively allocating...
Mike Hibler, Robert Ricci, Leigh Stoller, Jonathon...