Sciweavers

351 search results - page 57 / 71
» Perfect Constraints Are Tractable
Sort
View
ESORICS
2007
Springer
13 years 11 months ago
Satisfiability and Resiliency in Workflow Systems
We propose the role-and-relation-based access control (R2 BAC) model for workflow systems. In R2 BAC, in addition to a user's role memberships, the user's relationships w...
Qihua Wang, Ninghui Li
IANDC
2008
105views more  IANDC 2008»
13 years 7 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
WDAG
2010
Springer
196views Algorithms» more  WDAG 2010»
13 years 6 months ago
Brief Announcement: Failure Detectors Encapsulate Fairness
Abstract. We argue that failure detectors encapsulate fairness. Fairness is a measure of the number of steps a process takes relative to another processes and/or messages in transi...
Scott M. Pike, Srikanth Sastry, Jennifer L. Welch
ICIP
1998
IEEE
14 years 9 months ago
The Variable-Length Generalized Lapped Biorthogonal Transform
This paper introduces a class of linear phase lapped biorthogonal transforms with basis functions of variable length VLGLBT. The transform can be characterized by a lattice which ...
Trac D. Tran, Ricardo L. de Queiroz, Truong Q. Ngu...
INFOCOM
2009
IEEE
14 years 2 months ago
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access
—In cognitive wireless networks where secondary users (SUs) opportunistically access spectral white spaces of primary users (PUs), there exists an inherent tradeoff between sensi...
Senhua Huang, Xin Liu, Zhi Ding