Sciweavers

2421 search results - page 436 / 485
» Message from the Co-Chairs
Sort
View
CEAS
2005
Springer
14 years 2 months ago
Implicit Queries for Email
Implicit query systems examine a document and automatically conduct searches for the most relevant information. In this paper, we offer three contributions to implicit query resea...
Joshua Goodman, Vitor R. Carvalho
CEAS
2005
Springer
14 years 2 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
FASE
2005
Springer
14 years 2 months ago
Coverage Criteria for Testing of Object Interactions in Sequence Diagrams
This work defines several control-flow coverage criteria for testing the interactions among a set of collaborating objects. The criteria are based on UML sequence diagrams that a...
Atanas Rountev, Scott Kagan, Jason Sawin
GCC
2005
Springer
14 years 2 months ago
A Topology Adaptation Protocol for Structured Superpeer Overlay Construction
Peer-to-peer networks can be divided into structured and unstructured based on their overlay topologies. In reality, unstructured p2p networks with superpeers have proved their cap...
Changyong Niu, Jian Wang, Ruimin Shen
ISPEC
2005
Springer
14 years 2 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng