Sciweavers

1265 search results - page 37 / 253
» Finding the Key to a Synapse
Sort
View
ISSTA
2012
ACM
11 years 11 months ago
Residual investigation: predictive and precise bug detection
We introduce the concept of “residual investigation” for program analysis. A residual investigation is a dynamic check installed as a result of running a static analysis that ...
Kaituo Li, Christoph Reichenbach, Christoph Csalln...
WS
2004
ACM
14 years 2 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
ESORICS
1994
Springer
14 years 1 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
HICSS
2007
IEEE
143views Biometrics» more  HICSS 2007»
14 years 3 months ago
B-to-B E-Commerce: Assessing the Impacts of RFID Technology in a Five Layer Supply Chain
This paper attempts to track key performance indicators in order to assess the impacts of RFID technology in a five layer supply chain in the utility sector. Findings point to som...
Ygal Bendavid, Élisabeth Lefebvre, Louis A....
SEMWEB
2007
Springer
14 years 3 months ago
ArnetMiner: An Expertise Oriented Search System for Web Community
Expertise Oriented Search aims at providing comprehensive analysis and mining for people from distributed sources. In this paper, we give an overview of the expertise oriented sear...
Jie Tang, Jing Zhang, Duo Zhang, Limin Yao, Chunli...