Sciweavers

47 search results - page 4 / 10
» Traceable Sets
Sort
View
DM
2008
95views more  DM 2008»
13 years 7 months ago
Forbidden subgraphs and the existence of paths and cycles passing through specified vertices
In [2], Duffus et al. showed that every connected graph G which contains no induced subgraph isomorphic to a claw or a net is traceable. And they also showed that if a 2-connected...
Jun Fujisawa, Katsuhiro Ota, Takeshi Sugiyama, Mas...
SEKE
2007
Springer
14 years 1 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
CSMR
2008
IEEE
13 years 9 months ago
Decision Reuse in an Interactive Model Transformation
Propagating incremental changes and maintaining traceability are challenges for interactive model transformations, i.e. ones that combine automation with user decisions. After evo...
Mika Siikarla, Tarja Systä
MDM
2010
Springer
193views Communications» more  MDM 2010»
14 years 5 days ago
Data-Based Agreement for Inter-vehicle Coordination
Abstract—Data-based agreement is increasingly used to implement traceable coordination across mobile entities such as adhoc networked (autonomous) vehicles. In our work, we focus...
Brahim Ayari, Abdelmajid Khelil, Kamel Saffar, Nee...
CCS
2006
ACM
13 years 11 months ago
A fully collusion resistant broadcast, trace, and revoke system
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems...
Dan Boneh, Brent Waters