Sciweavers

505 search results - page 54 / 101
» Message from General Co-Chairs
Sort
View
PETRA
2009
ACM
14 years 4 months ago
Towards a social fabric for pervasive assistive environments
The digital divide refers to a lack of technological access, part of which involves exclusion from a blooming arena of social interaction. People without mobile phones or PCs cann...
Clare Owens, David E. Millard, Andrew Stanford-Cla...
IEEEIAS
2007
IEEE
14 years 4 months ago
An LSB Data Hiding Technique Using Prime Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically m...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
LICS
2007
IEEE
14 years 4 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam
ICPPW
2005
IEEE
14 years 3 months ago
Load Balancing Hybrid Programming Models for SMP Clusters and Fully Permutable Loops
This paper emphasizes on load balancing issues associated with hybrid programming models for the parallelization of fully permutable nested loops onto SMP clusters. Hybrid paralle...
Nikolaos Drosinos, Nectarios Koziris
EDCC
2005
Springer
14 years 3 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...