Sciweavers

35419 search results - page 127 / 7084
» How are we doing
Sort
View
114
Voted
CCS
1998
ACM
15 years 8 months ago
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP. We s...
Bruce Schneier, Mudge
124
Voted
DAGSTUHL
2006
15 years 5 months ago
A Taxonomy of Aspects in Terms of Crosscutting Concerns
Abstract. Aspect-orientation provides support for " Separation of Concerns" by means of techniques that first isolate and then weave concerns. Most work in aspect-orienta...
Jorge Fox
DEON
2010
Springer
15 years 8 months ago
Privacy Policies with Modal Logic: The Dynamic Turn
Abstract. Privacy policies are often defined in terms of permitted messages. Instead, in this paper we derive dynamically the permitted messages from static privacy policies defi...
Guillaume Aucher, Guido Boella, Leendert van der T...
100
Voted
ATAL
2005
Springer
15 years 9 months ago
Global convergence of local agent behaviors
Many multi-agent systems seek to reconcile two apparently inconsistent constraints. The system’s overall objective is defined at a global level. However, the agents have only lo...
H. Van Dyke Parunak, Sven Brueckner, John A. Saute...
134
Voted
DCG
2008
93views more  DCG 2008»
15 years 3 months ago
Odd Crossing Number and Crossing Number Are Not the Same
The crossing number of a graph is the minimum number of edge intersections in a plane drawing of a graph, where each intersection is counted separately. If instead we count the nu...
Michael J. Pelsmajer, Marcus Schaefer, Daniel Stef...