Sciweavers

2446 search results - page 432 / 490
» Polyadic Concept Analysis
Sort
View
RFIDSEC
2010
13 years 7 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
SOSYM
2010
176views more  SOSYM 2010»
13 years 7 months ago
On challenges of model transformation from UML to Alloy
Abstract The Unified Modeling Language (UML) is the de facto language used in the industry for software specifications. Once an application has been specified, Model Driven Arch...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
TPDS
2010
135views more  TPDS 2010»
13 years 7 months ago
Maximizing Service Reliability in Distributed Computing Systems with Random Node Failures: Theory and Implementation
—In distributed computing systems (DCSs) where server nodes can fail permanently with nonzero probability, the system performance can be assessed by means of the service reliabil...
Jorge E. Pezoa, Sagar Dhakal, Majeed M. Hayat
ADAEUROPE
2010
Springer
13 years 6 months ago
Scheduling Configuration of Real-Time Component-Based Applications
Abstract: This paper proposes a strategy to manage the schedulability of realtime component-based applications that is fully compatible with the concept of component viewed as a re...
Patricia López Martínez, Laura Barro...
CIKM
2010
Springer
13 years 6 months ago
Web search solved?: all result rankings the same?
The objective of this work is to derive quantitative statements about what fraction of web search queries issued to the state-of-the-art commercial search engines lead to excellen...
Hugo Zaragoza, Berkant Barla Cambazoglu, Ricardo A...