Sciweavers

3384 search results - page 118 / 677
» More Testable Properties
Sort
View
TPHOL
2009
IEEE
14 years 3 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
KCAP
2009
ACM
14 years 3 months ago
Workflow matching using semantic metadata
Workflows are becoming an increasingly more common paradigm to manage scientific analyses. As workflow repositories start to emerge, workflow retrieval and discovery becomes a cha...
Yolanda Gil, Jihie Kim, Gonzalo Flórez Puga...
ICC
2008
IEEE
112views Communications» more  ICC 2008»
14 years 3 months ago
Impact of Super-Diffusive Behavior on Routing Performance in Delay Tolerant Networks
— Motivated by the recent findings of super-diffusive patterns in mobility traces, we investigate the impact of superdiffusive behavior of mobile nodes on contact-based metrics ...
Sungwon Kim, Do Do Eun
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 3 months ago
Interdependent Risk in Interacting Infrastructure Systems
Critical infrastructures display many of the characteristic properties of complex systems. They exhibit infrequent large failures events that often obey a power law distribution i...
Benjamin A. Carreras, David E. Newman, Paul Gradne...
AVSS
2006
IEEE
14 years 2 months ago
Dissecting the Image of the Absolute Conic
In this paper, we revisit the role of the image of the absolute conic (IAC) in recovering the camera geometry. We derive new constraints on IAC that advance our understanding of i...
Imran N. Junejo, Hassan Foroosh