Sciweavers

844 search results - page 13 / 169
» aim 2004
Sort
View
SPW
2004
Springer
14 years 27 days ago
Limits to Anonymity When Using Credentials
This paper identifies certain privacy threats that apply to anonymous credential systems. The focus is on timing attacks that apply even if the system is cryptographically secure....
Andreas Pashalidis, Chris J. Mitchell
TFM
2004
Springer
130views Formal Methods» more  TFM 2004»
14 years 27 days ago
Advertising Formal Methods and Organizing Their Teaching: Yes, but ...
This position paper aims to address most of the “challenges” suggested by the conference’s CFP plus a few others. The style is deliberately informal and colloquial, occasiona...
Dino Mandrioli
ANSS
2004
IEEE
13 years 11 months ago
A Service Scheduler in a Trustworthy System
The aim of the research is to investigate techniques that support efficient service scheduling algorithms in a service-oriented fault-tolerant real-time distributed system. Techni...
Yinong Chen
EH
2004
IEEE
94views Hardware» more  EH 2004»
13 years 11 months ago
Processor Architectures for Ontogenesis
In this article we present the outline of a novel processor architecture aimed to the design of systems that more closely resemble, within the limitations imposed by the capabilit...
Gianluca Tempesti
DATESO
2004
81views Database» more  DATESO 2004»
13 years 9 months ago
INEX - a Broadly Accepted Data Set for XML Database Processing?
Abstract. The aim of the article is to inform about the INEX initiative, its testing data set, actual results, and future plans. We discuss and demonstrate possible utilization of ...
Pavel Loupal, Michal Valenta