Sciweavers

2043 search results - page 363 / 409
» Reasoning About Security Models
Sort
View
REX
1991
14 years 1 months ago
From Timed to Hybrid Systems
We propose a framework for the formal speci cation and veri cation of timed and hybrid systems. For timed systems we propose a speci cation language that refers to time only throug...
Oded Maler, Zohar Manna, Amir Pnueli
AFRICACRYPT
2010
Springer
14 years 1 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
ADBIS
2010
Springer
174views Database» more  ADBIS 2010»
13 years 11 months ago
Exploiting the Semantics of Location Granules in Location-Dependent Queries
Abstract. The need for location-based services has motivated an important research effort in the efficient processing of location-dependent queries. Most of the existing approaches...
Carlos Bobed, Sergio Ilarri, Eduardo Mena
AGI
2008
13 years 11 months ago
Fusing Animals and Humans
AI has many techniques and tools at its disposal, yet seems to be lacking some special "juice" needed to create a true being. We propose that the missing ingredients are ...
Jonathan Connell
SDM
2010
SIAM
183views Data Mining» more  SDM 2010»
13 years 11 months ago
GraSS: Graph Structure Summarization
Large graph databases are commonly collected and analyzed in numerous domains. For reasons related to either space efficiency or for privacy protection (e.g., in the case of socia...
Kristen LeFevre, Evimaria Terzi