Sciweavers

628 search results - page 98 / 126
» Specifying Multiagent Organizations
Sort
View
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
13 years 12 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
BMCBI
2008
128views more  BMCBI 2008»
13 years 10 months ago
Efficient computation of absent words in genomic sequences
Background: Analysis of sequence composition is a routine task in genome research. Organisms are characterized by their base composition, dinucleotide relative abundance, codon us...
Julia Herold, Stefan Kurtz, Robert Giegerich
ICDE
2008
IEEE
136views Database» more  ICDE 2008»
14 years 11 months ago
Processing Event-Monitoring Queries in Sensor Networks
In this paper we present algorithms for building and maintaining efficient collection trees that provide the conduit to disseminate data required for processing monitoring queries...
Vassilis Stoumpos, Antonios Deligiannakis, Yannis ...
ICDE
1996
IEEE
124views Database» more  ICDE 1996»
14 years 11 months ago
Automating the Assembly of Presentations from Multimedia Databases
A multimedia presentation refers to the presentation of multimedia data using output devices such as monitors for text and video, and speakers for audio. Each presentation consist...
Gultekin Özsoyoglu, Joel Kraft, Veli Hakkoyma...
DAC
2002
ACM
14 years 11 months ago
High-Level specification and automatic generation of IP interface monitors
A central problem in functional verification is to check that a circuit block is producing correct outputs while enforcing that the environment is providing legal inputs. To attac...
Marcio T. Oliveira, Alan J. Hu