Sciweavers

19003 search results - page 124 / 3801
» We Need Assurance!
Sort
View
LISA
2004
15 years 6 months ago
Experience in Implementing an HTTP Service Closure
One ideal of configuration management is to specify only desired behavior in a high-level language, while an automatic configuration management system assures that behavior on an ...
Steven Schwartzberg, Alva L. Couch
IJCAI
1989
15 years 6 months ago
Approximation Algorithms for Temporal Reasoning
We consider a representation for temporal relations between intervals introduced by James Allen, and its associated computational or reasoning problem: given possibly indefinite ...
Peter van Beek
140
Voted
WCE
2007
15 years 6 months ago
A Brief Survey on RFID Privacy and Security
Abstract— In this survey we take a look at different approaches proposed in the literature for addressing the privacy and security issues derived from the Radio-Frequency IDenti...
J. Aragones-Vilella, Antoni Martínez-Balles...
319
Voted
IJNSEC
2008
118views more  IJNSEC 2008»
15 years 5 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
125
Voted
FAC
2007
90views more  FAC 2007»
15 years 5 months ago
Responsiveness and stable revivals
Individual components in an inter-operating system require assurance from other components both of appropriate functionality and of suitable responsiveness. We have developed prope...
Joy N. Reed, A. W. Roscoe, J. E. Sinclair