Sciweavers

5863 search results - page 1082 / 1173
» On Model-Checking of P Systems
Sort
View
CCS
2007
ACM
15 years 10 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
CONCUR
2007
Springer
15 years 10 months ago
Rule-Based Modelling of Cellular Signalling
Abstract. Modelling is becoming a necessity in studying biological signalling pathways, because the combinatorial complexity of such systems rapidly overwhelms intuitive and qualit...
Vincent Danos, Jérôme Feret, Walter F...
VTC
2006
IEEE
100views Communications» more  VTC 2006»
15 years 9 months ago
Initial and Post-Initial Acquisition in the Serial Search Based Noncoherent Multiple Transmit/Receive Antenna Aided DS-CDMA Down
— In this paper we investigate the issues of both initial and post-initial acquisition schemes in the multiple transmit/receive antenna aided DS-CDMA downlink, when communicating...
Seung Hwan Won, Lajos Hanzo
VISUALIZATION
2005
IEEE
15 years 9 months ago
Illustration and Photography Inspired Visualization of Flows and Volumes
Understanding and analyzing complex volumetrically varying data is a difficult problem. Many computational visualization techniques have had only limited success in succinctly po...
Nikolai A. Svakhine, Yun Jang, David S. Ebert, Kel...
ATAL
2005
Springer
15 years 9 months ago
Modeling exceptions via commitment protocols
This paper develops a model for exceptions and an approach for incorporating them in commitment protocols among autonomous agents. Modeling and handling exceptions is critical for...
Ashok U. Mallya, Munindar P. Singh
« Prev « First page 1082 / 1173 Last » Next »