Sciweavers

1679 search results - page 255 / 336
» Strong order equivalence
Sort
View
DATE
2004
IEEE
102views Hardware» more  DATE 2004»
14 years 15 days ago
High Security Smartcards
New consumer appliances such as PDA, Set Top Box, GSM/UMTS terminals enable an easy access to the internet and strongly contribute to the development of ecommerce and m-commerce s...
Marc Renaudin, G. Fraidy Bouesse, Ph. Proust, J. P...
CIA
2006
Springer
14 years 15 days ago
The Distortion of Cardinal Preferences in Voting
The theoretical guarantees provided by voting have distinguished it as a prominent method of preference aggregation among autonomous agents. However, unlike humans, agents usually ...
Ariel D. Procaccia, Jeffrey S. Rosenschein
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
14 years 15 days ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
ECAI
2006
Springer
14 years 13 days ago
Learning Behaviors Models for Robot Execution Control
Robust execution of robotic tasks is a difficult problem. In many situations, these tasks involve complex behaviors combining different functionalities (e.g. perception, localizat...
Guillaume Infantes, Félix Ingrand, Malik Gh...
AIME
2003
Springer
14 years 13 days ago
Experiences in the Formalisation and Verification of Medical Protocols
Abstract. Medical practice protocols or guidelines are statements to assist practitioners and patient decisions about appropriate health care for specific circumstances. In order t...
Mar Marcos, Michael Balser, Annette ten Teije, Fra...