Sciweavers

209 search results - page 19 / 42
» Establishing Persistent Identity using the Handle System
Sort
View
WWW
2003
ACM
14 years 27 days ago
DNS Resolution with Renewal Using Piggyback
: Domain name system (DNS) is a primary identification mechanism for Internet applications. However, DNS resolutions often take an unbearably long time, and this could seriously i...
Baekcheol Jang, Kilnam Chon
WSC
2008
13 years 10 months ago
Simplification and aggregation strategies applied for factory analysis in conceptual phase using simulation
Despite that simulation possesses an establish background and offers tremendous promise for designing and analyzing complex production systems, manufacturing industry has been les...
Matias Urenda Moris, Amos Ng, Jacob Svensson
ATAL
2007
Springer
14 years 1 months ago
Goals in the context of BDI plan failure and planning
We develop a Belief-Desire-Intention (BDI) style agent-oriented programming language with special emphasis on the semantics of goals in the presence of the typical BDI failure han...
Sebastian Sardiña, Lin Padgham
VTS
2000
IEEE
99views Hardware» more  VTS 2000»
14 years 23 hour ago
Virtual Scan Chains: A Means for Reducing Scan Length in Cores
A novel design-for-test (DFT) technique is presented for designing a core with a “virtual scan chain” which looks (to the system integrator) like it is shorter than the real s...
Abhijit Jas, Bahram Pouya, Nur A. Touba
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters