Sciweavers

15375 search results - page 264 / 3075
» cans 2008
Sort
View
COMPUTER
2008
86views more  COMPUTER 2008»
13 years 8 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
CONSTRAINTS
2008
70views more  CONSTRAINTS 2008»
13 years 8 months ago
Reformulating Table Constraints using Functional Dependencies - An Application to Explanation Generation
We present a novel approach to automatically reformulating constraints defined as tables of allowed assignments to variables. Constraints of this form are common in a variety of se...
Hadrien Cambazard, Barry O'Sullivan
CONSTRAINTS
2008
132views more  CONSTRAINTS 2008»
13 years 8 months ago
Essence : A constraint language for specifying combinatorial problems
Abstract. Essence is a formal language for specifying combinatorial problems, in a manner similar to natural rigorous specifications that use a mixture of natural language and disc...
Alan M. Frisch, Warwick Harvey, Christopher Jeffer...
COR
2008
105views more  COR 2008»
13 years 8 months ago
Minimizing the object dimensions in circle and sphere packing problems
Given a fixed set of identical or different-sized circular items, the problem we deal with consists on finding the smallest object within which the items can be packed. Circular, ...
Ernesto G. Birgin, F. N. C. Sobral
CROSSROADS
2008
86views more  CROSSROADS 2008»
13 years 8 months ago
The use of compiler optimizations for embedded systems software
O ptimizing embedded applications using a compiler can generally be broken down into two major categories: hand-optimizing code to take advantage of a particular processor's ...
Joe Bungo