Sciweavers

1124 search results - page 154 / 225
» Generalized Conditioning in Neighbourhood Models
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
14 years 1 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
SDB
1995
95views Database» more  SDB 1995»
14 years 13 days ago
Semantics of Database Transformations
Database transformations arise in many di erent settings including database integration, evolution of database systems, and implementing user views and data-entry tools. This paper...
Peter Buneman, Susan B. Davidson, Anthony Kosky
AAAI
1990
13 years 10 months ago
Negotiation and Conflict Resolution in Non-Cooperative Domains
In previous work [Zlotkin and Rosenschein, 1989a], we have developed a negotiation protocol and offered some negotiation strategies that are in equilibrium. This negotiation proce...
Gilad Zlotkin, Jeffrey S. Rosenschein
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 9 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell
JMM2
2008
107views more  JMM2 2008»
13 years 8 months ago
Dynamic Generation of SMIL-Based Multimedia Interfaces
The current heterogeneous world of networks and terminals combined with the generalized mobility of users pose telecommunications operators and service providers the challenge of d...
José Manuel Oliveira, Eurico Carrapatoso