Sciweavers

401 search results - page 58 / 81
» Symmetric Subresultants and Applications
Sort
View
B
2007
Springer
14 years 2 months ago
Symmetry Reduction for B by Permutation Flooding
Symmetry reduction is an established method for limiting the amount of states that have to be checked during exhaustive model checking. The idea is to only verify a single represen...
Michael Leuschel, Michael J. Butler, Corinna Sperm...
CCS
2007
ACM
14 years 2 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
EUC
2007
Springer
14 years 2 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
IPPS
2006
IEEE
14 years 2 months ago
A virtual network (ViNe) architecture for grid computing
This paper describes a virtual networking approach for Grids called ViNe. It enables symmetric connectivity among Grid resources and allows existing applications to run unmodified...
Maurício O. Tsugawa, José A. B. Fort...
VISUALIZATION
2005
IEEE
14 years 2 months ago
Visualization of White Matter Tracts with Wrapped Streamlines
Diffusion tensor imaging is a magnetic resonance imaging method which has gained increasing importance in neuroscience and especially in neurosurgery. It acquires diffusion proper...
Frank Enders, Natascha Sauber, Dorit Merhof, Peter...