Sciweavers

913 search results - page 114 / 183
» Full Abstraction for Linda
Sort
View
E4MAS
2006
Springer
14 years 18 days ago
E4MAS Through Electronic Institutions
Abstract. Today, the concept of an environment for multi-agent systems is in its pioneering phase. Consequently, the development of supporting software technologies is still rather...
Josep Lluís Arcos, Pablo Noriega, Juan A. R...
FSE
2006
Springer
132views Cryptology» more  FSE 2006»
14 years 18 days ago
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) bey...
Tetsu Iwata
ADBIS
2003
Springer
204views Database» more  ADBIS 2003»
14 years 18 days ago
Hierarchical Bitmap Index: An Efficient and Scalable Indexing Technique for Set-Valued Attributes
Abstract. Set-valued attributes are convenient to model complex objects occurring in the real world. Currently available database systems support the storage of set-valued attribut...
Mikolaj Morzy, Tadeusz Morzy, Alexandros Nanopoulo...
CAIP
1997
Springer
125views Image Analysis» more  CAIP 1997»
14 years 15 days ago
An Algorithm for Intrinsic Dimensionality Estimation
Abstract. In this paper a new method for analyzing the intrinsic dimensionality (ID) of low dimensional manifolds in high dimensional feature spaces is presented. The basic idea is...
Jörg Bruske, Gerald Sommer
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
14 years 8 days ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert