Sciweavers

1679 search results - page 139 / 336
» Strong order equivalence
Sort
View
FTDCS
2003
IEEE
14 years 3 months ago
Adopting Redundancy Techniques for Multicast Stream Authentication
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Fe...
ATAL
2003
Springer
14 years 3 months ago
Representation and reasoning for DAML-based policy and domain services in KAoS and nomads
To increase the assurance with which agents can be deployed in operational settings, we have been developing the KAoS policy and domain services. In conjunction with Nomads strong...
Jeffrey M. Bradshaw, Andrzej Uszok, Renia Jeffers,...
CSFW
2009
IEEE
14 years 2 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
ZUM
2000
Springer
14 years 1 months ago
Retrenchment, Refinement, and Simulation
: Retrenchment is introduced as a liberalisation of refinement intended to address some of the shortcomings of refinement as sole means of progressing from simple abstract models t...
Richard Banach, Michael Poppleton
APPROX
2008
Springer
89views Algorithms» more  APPROX 2008»
14 years 5 days ago
Quantum and Randomized Lower Bounds for Local Search on Vertex-Transitive Graphs
We study the problem of local search on a graph. Given a real-valued black-box function f on the graph's vertices, this is the problem of determining a local minimum of f--a v...
Hang Dinh, Alexander Russell