Sciweavers

632 search results - page 5 / 127
» Two Facets of Authentication
Sort
View
ICICS
2005
Springer
14 years 1 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell
ALENEX
2007
126views Algorithms» more  ALENEX 2007»
13 years 9 months ago
0/1 Vertex and Facet Enumeration with BDDs
In polyhedral studies of 0/1 polytopes two prominent problems exist. One is the vertex enumeration problem: Given a system of inequalities, enumerate its feasible 0/1 points. Anot...
Markus Behle, Friedrich Eisenbrand
INFORMS
2010
100views more  INFORMS 2010»
13 years 4 months ago
Two-Step MIR Inequalities for Mixed Integer Programs
Two-step MIR inequalities are valid inequalities derived from a facet of a simple mixedinteger set with three variables and one constraint. In this paper we investigate how to eff...
Sanjeeb Dash, Marcos Goycoolea, Oktay Günl&uu...
DASFAA
2009
IEEE
147views Database» more  DASFAA 2009»
14 years 2 months ago
SUITS: Faceted User Interface for Constructing Structured Queries from Keywords
Keyword search and database query are two ways for retrieving data in real world settings. In this demonstration, we show SUITS, a novel search interface over relational databases ...
Elena Demidova, Xuan Zhou, Gideon Zenz, Wolfgang N...
SEMWEB
2004
Springer
14 years 27 days ago
Querying Faceted Databases
Faceted classification allows one to model applications with complex classification hierarchies using orthogonal dimensions. Recent work has examined the use of faceted classi...
Kenneth A. Ross, Angel Janevski