Sciweavers

674 search results - page 55 / 135
» Separating Structure from Interestingness
Sort
View
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
14 years 3 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur
MPC
2010
Springer
246views Mathematics» more  MPC 2010»
13 years 12 months ago
Abstraction of Object Graphs in Program Verification
ion of Object Graphs in Program Verification Yifeng Chen1 and J.W. Sanders2 1 HCST Key Lab at School of EECS, Peking University, China. 2 UNU-IIST, Macao. A set-theoretic formalism...
Yifeng Chen, Jeff W. Sanders
IRI
2009
IEEE
14 years 4 months ago
An Agent-based Formal Framework for Modeling and Simulating Supply Chains
We propose an open and extensible agent-based formal framework for modeling and simulating supply chains. Since structures and behaviors of supply chains can be very different bas...
Li Tan, Shenghan Xu, Benjamin Meyer, Brock Erwin
SEMWEB
2004
Springer
14 years 3 months ago
GridVine: Building Internet-Scale Semantic Overlay Networks
Abstract. This paper addresses the problem of building scalable semantic overlay networks. Our approach follows the principle of data independence by separating a logical layer, th...
Karl Aberer, Philippe Cudré-Mauroux, Manfre...
VISUALIZATION
2000
IEEE
14 years 2 months ago
Visualizing volume data using physical models
Visualization techniques enable scientists to interactively explore 3D data sets, segmenting and cutting them to reveal inner structure. While powerful, these techniques suffer fr...
David R. Nadeau, Michael J. Bailey