Sciweavers

1105 search results - page 213 / 221
» Fuzzy logics as the logics of chains
Sort
View
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
14 years 1 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
ICS
2004
Tsinghua U.
14 years 28 days ago
Cluster prefetch: tolerating on-chip wire delays in clustered microarchitectures
The growing dominance of wire delays at future technology points renders a microprocessor communication-bound. Clustered microarchitectures allow most dependence chains to execute...
Rajeev Balasubramonian
IFIP
2004
Springer
14 years 27 days ago
The Driving Philosophers
We introduce a new synchronization problem in mobile ad-hoc systems: the Driving Philosophers. In this problem, an unbounded number of driving philosophers (processes) access a rou...
Sébastien Baehni, Roberto Baldoni, Rachid G...
ICEIS
2002
IEEE
14 years 15 days ago
Integrating Mobile Agent Infrastructures in Operational ERP Systems
: In this paper we present our most recent work carried out in the wider context of the IST-ADRENALIN project, to facilitate formation and lifecycle management of networked enterpr...
Apostolos Vontas, Philippos Koutsakas, Christina A...
PAPM
2001
Springer
128views Mathematics» more  PAPM 2001»
13 years 12 months ago
Faster and Symbolic CTMC Model Checking
Abstract. This paper reports on the implementation and the experiments with symbolic model checking of continuous-time Markov chains using multi-terminal binary decision diagrams (...
Joost-Pieter Katoen, Marta Z. Kwiatkowska, Gethin ...