Sciweavers

1528 search results - page 189 / 306
» On Signatures for Communication Graphs
Sort
View
XMLSEC
2003
ACM
14 years 2 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
JOC
2008
86views more  JOC 2008»
13 years 9 months ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell
PODC
2012
ACM
12 years 2 days ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
ICIP
2002
IEEE
14 years 11 months ago
Advanced animation framework for virtual character within the MPEG-4 standard
This paper presents an advanced animation framework for virtual character within the MPEG-4 standard. The Bonebased Animation (BBA) specifications are described and it is shown ho...
Françoise J. Prêteux, Marius Preda
IPPS
2009
IEEE
14 years 4 months ago
Deadlock prevention by turn prohibition in interconnection networks
Abstract—In this paper we consider the problem of constructing minimal cycle-breaking sets of turns for graphs that model communication networks, as a method to prevent deadlocks...
Lev B. Levitin, Mark G. Karpovsky, Mehmet Mustafa