Sciweavers

2314 search results - page 374 / 463
» What's in a model
Sort
View
ASIACRYPT
2009
Springer
14 years 1 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
14 years 1 months ago
Language communities in enterprise architecture research
As a result of the rigor vs. relevance debate, researchers who focus on design research on organizational problems are beginning to focus on their research methodology’s rigor. ...
Joachim Schelp, Robert Winter
AAAI
2007
14 years 12 days ago
Real Arguments Are Approximate Arguments
There are a number of frameworks for modelling argumentation in logic. They incorporate a formal representation of individual arguments and techniques for comparing conflicting a...
Anthony Hunter
LISA
2008
14 years 12 days ago
ENAVis: Enterprise Network Activities Visualization
Abstract-- With the prevalence of multi-user environments, it has become an increasingly challenging task to precisely identify who is doing what on an enterprise network. Current ...
Qi Liao, Andrew Blaich, Aaron Striegel, Douglas Th...
ACMACE
2008
ACM
14 years 2 days ago
BeatBender: subsumption architecture for autonomous rhythm generation
BeatBender is a computer music project that explores a new method for generating emergent rhythmic drum patterns using the subsumption architecture. Rather than explicitly coding ...
Aaron Levisohn, Philippe Pasquier