Sciweavers

426 search results - page 53 / 86
» Specification, Abduction, and Proof
Sort
View
ACISP
2008
Springer
13 years 11 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
CSREAESA
2004
13 years 11 months ago
Flexible Internet Based Diagnostics of Embedded Systems
The remote diagnostics of faults and operating states of technical equipment offers increased benefits and cost advantages for consumers and manufacturers. These advantages can al...
Jan Traumueller
ICWS
2004
IEEE
13 years 11 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
MSV
2004
13 years 11 months ago
Towards Quality of Service Based Resource Management for Cluster-Based Image Database
The main research in the area of image databases addresses the improvement of retrieval quality and the speedup of the query processing. A number of image retrieval systems reache...
Andreas Brüning, Frank Drews, Martin Hoefer, ...
WSC
2004
13 years 11 months ago
Retrospective Approximation Algorithms for the Multidimensional Stochastic Root-Finding Problem
The stochastic root-finding problem (SRFP) is that of solving a system of q equations in q unknowns using only an oracle that provides estimates of the function values. This paper...
Raghu Pasupathy, Bruce W. Schmeiser