Sciweavers

5084 search results - page 65 / 1017
» Proving Possibility Properties
Sort
View
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
13 years 12 months ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker
ICWSM
2008
13 years 11 months ago
Discovering Relationships among Tags and Geotags
This paper presents an analysis of the correlation of annotated information unit (textual) tags and geographical identification metadata geotags. In this paper, to make it possibl...
Sang Su Lee, Dongwoo Won, Dennis McLeod
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 10 months ago
Continuum Percolation in the Intrinsically Secure Communications Graph
The intrinsically secure communications graph (-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence...
Pedro C. Pinto, Moe Z. Win
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 10 months ago
Automatic Verification of Parametric Specifications with Complex Topologies
The focus of this paper is on reducing the complexity in verification by exploiting modularity at various levels: in specification, in verification, and structurally. For specifica...
Johannes Faber, Carsten Ihlemann, Swen Jacobs, Vio...
ENTCS
2010
165views more  ENTCS 2010»
13 years 10 months ago
Correct Execution of Reconfiguration for Stateful Components
In component-based software engineering, reconfiguration describes structural changes to the architecture of a component system. For stateful components, not only structural but a...
Moritz Hammer, Alexander Knapp