Sciweavers

663 search results - page 118 / 133
» PKI design for the real world
Sort
View
AAAI
1996
13 years 8 months ago
Comet: An Application of Model-Based Reasoning to Accounting Systems
An important problem faced by auditors is gauging how much reliance can be placed on the accounting systems that process millions of transactions to produce the numbers summarized...
Robert Nado, Melanie Chams, Jeff Delisio, Walter H...
JISE
2008
77views more  JISE 2008»
13 years 7 months ago
Formalized Entity Extraction Methodology for Changeable Business Requirements
business requirement in the real world cannot be abstracted correctly into an entity-relationship schema. Once core entities are discovered, we can obtain an Entity-Relationship Di...
Namgyu Kim, Sangwon Lee, Songchun Moon
TPDS
2008
134views more  TPDS 2008»
13 years 7 months ago
Extending the TokenCMP Cache Coherence Protocol for Low Overhead Fault Tolerance in CMP Architectures
It is widely accepted that transient failures will appear more frequently in chips designed in the near future due to several factors such as the increased integration scale. On th...
Ricardo Fernández Pascual, José M. G...
EUROPKI
2009
Springer
13 years 5 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
EUSFLAT
2009
156views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Interactive Fuzzy Modeling by Evolutionary Multiobjective Optimization with User Preference
One of the new trends in genetic fuzzy systems (GFS) is the use of evolutionary multiobjective optimization (EMO) algorithms. This is because EMO algorithms can easily handle two c...
Yusuke Nojima, Hisao Ishibuchi