Sciweavers

959 search results - page 103 / 192
» Possible and Necessary h-Indices
Sort
View
SIGDOC
2005
ACM
14 years 2 months ago
Metadata based authoring for technical documentation
The creation process of technical documentation is an expensive and time-consuming task especially for complex products. To make this process more cost-efficient computerized supp...
Ingo Stock, Michael Weber, Eckhard Steinmeier
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
14 years 2 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
AI
2005
Springer
14 years 2 months ago
First Steps Towards Incremental Diagnosis of Discrete-Event Systems
This paper deals with the incremental off-line computation of diagnosis of discrete-event systems. Traditionally, the diagnosis is computed from the global automaton describing th...
Alban Grastien, Marie-Odile Cordier, Christine Lar...
ASIACRYPT
2005
Springer
14 years 2 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
BERTINORO
2005
Springer
14 years 2 months ago
Self-Aware Software - Will It Become a Reality?
The possibility of building self-aware software fascinated computer scientist since the beginning of computer science. Research in AI, and in particular on software agents, agent s...
Péter András, Bruce G Charlton