Sciweavers

1054 search results - page 167 / 211
» Model Transformations in the Model-Based Development of Real...
Sort
View
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 2 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
COMCOM
2008
72views more  COMCOM 2008»
13 years 9 months ago
Stochastic analysis of the interplay between object maintenance and churn
Due to the prevalence of peer dynamics (i.e., churn), object maintenance becomes a fundamental issue in peer-to-peer storage systems. Although quite a few prototypes have been des...
Di Wu, Ye Tian, Kam-Wing Ng, Anwitaman Datta
ISF
2008
114views more  ISF 2008»
13 years 8 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
VLDB
1989
ACM
110views Database» more  VLDB 1989»
14 years 26 days ago
Derived Data Update in Semantic Databases
The derived data update problem involves the transformation of modifications of derived facts into corresponding changes to base facts and other derived facts. Using a database sc...
I-Min A. Chen, Dennis McLeod
CICLING
2010
Springer
13 years 5 months ago
Emotion Holder for Emotional Verbs - The Role of Subject and Syntax
Abstract. Human-like holder plays an important role in identifying actual emotion expressed in text. This paper presents a baseline followed by syntactic approach for capturing emo...
Dipankar Das, Sivaji Bandyopadhyay