Sciweavers

8658 search results - page 1522 / 1732
» Models of Command and Control
Sort
View
160
Voted
CBSQ
2003
Springer
15 years 7 months ago
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability
The use of formal model based (FMB) methods to evaluate the quality of the components is an important research area. Except for a growing number of exceptions, FMB methods are sti...
Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon
103
Voted
CCS
2003
ACM
15 years 7 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
117
Voted
CONCUR
2003
Springer
15 years 7 months ago
A Compositional Semantic Theory for Synchronous Component-based Design
Abstract. Digital signal processing and control (DSPC) tools allow application developers to assemble systems by connecting predefined components in signal–flow graphs and by h...
Barry Norton, Gerald Lüttgen, Michael Mendler
130
Voted
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 7 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
108
Voted
EUROPAR
2003
Springer
15 years 7 months ago
Exploring the Catallactic Coordination Approach for Peer-to-Peer Systems
Efficient discovery and resource allocation is one of the challenges of current Peer-to-Peer systems. In centralized approaches, the user requests can be matched to the fastest, ch...
Oscar Ardaiz, Pau Artigas, Torsten Eymann, Felix F...
« Prev « First page 1522 / 1732 Last » Next »