Sciweavers

1679 search results - page 117 / 336
» Strong order equivalence
Sort
View
CSFW
2004
IEEE
14 years 1 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
CIE
2006
Springer
14 years 1 months ago
Forcing with Random Variables and Proof Complexity
or representation theory of groups), and even borrows abstract geometrical concepts like Euler characteristic or Grothendieck ring. However, the most stimulating for proof complexi...
Jan Krajícek
DCOSS
2006
Springer
14 years 1 months ago
An Optimal Data Propagation Algorithm for Maximizing the Lifespan of Sensor Networks
We consider the problem of data propagation in wireless sensor networks and revisit the family of mixed strategy routing schemes. We show that maximizing the lifespan, balancing th...
Aubin Jarry, Pierre Leone, Olivier Powell, Jos&eac...
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
14 years 1 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
FOIKS
2010
Springer
14 years 1 months ago
Towards a Unified Model of Preference-Based Argumentation
Abstract. Argumentation is a reasoning model based on the construction and the evaluation of arguments. In his seminal paper, Dung has proe most abstract argumentation framework. I...
Jean-Rémi Bourguet, Leila Amgoud, Rallou Th...