Sciweavers

573 search results - page 82 / 115
» Temporal Views as Abstract Relations
Sort
View
ESORICS
1994
Springer
13 years 11 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
ISMIS
1994
Springer
13 years 11 months ago
Recognizing Credible Experts in Inaccurate Databases
Abstract: While the problem of incompletedata in databases has been extensively studied, a relatively unexplored form of uncertainty in databases, called inaccurate data, demands d...
Hasan M. Jamil, Fereidoon Sadri
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
13 years 11 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
JUCS
2008
122views more  JUCS 2008»
13 years 7 months ago
Using an Evolving Thematic Clustering in a Text Segmentation Process
Abstract: The thematic text segmentation task consists in identifying the most important thematic breaks in a document in order to cut it into homogeneous passages. We propose in t...
Sylvain Lamprier, Tassadit Amghar, Bernard Levrat,...
SAC
2008
ACM
13 years 7 months ago
Flexible pointer analysis using assign-fetch graphs
se a new abstraction for pointer analysis that represents reads and writes to memory instead of traditional points-to relations. Compared to points-to graphs, our Assign-Fetch Gra...
Marcio Buss, Daniel Brand, Vugranam C. Sreedhar, S...