Sciweavers

8135 search results - page 1344 / 1627
» network 2008
Sort
View
COORDINATION
2008
Springer
15 years 6 months ago
Multiparty Sessions in SOC
Abstract. Service oriented applications feature interactions among several participants over the network. Mechanisms such as correlation sets and two-party sessions have been propo...
Roberto Bruni, Ivan Lanese, Hernán C. Melgr...
138
Voted
CP
2008
Springer
15 years 6 months ago
Flow-Based Propagators for the SEQUENCE and Related Global Constraints
We propose new filtering algorithms for the SEQUENCE constraint and some extensions of the SEQUENCE constraint based on network flows. We enforce domain consistency on the SEQUENCE...
Michael J. Maher, Nina Narodytska, Claude-Guy Quim...
CTRSA
2008
Springer
113views Cryptology» more  CTRSA 2008»
15 years 6 months ago
Aggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on ...
Jonathan Katz, Andrew Y. Lindell
148
Voted
ECAI
2008
Springer
15 years 6 months ago
Structure segmentation and recognition in images guided by structural constraint propagation
In some application domains, such as medical imaging, the objects that compose the scene are known as well as some of their properties and their spatial arrangement. We can take ad...
Olivier Nempont, Jamal Atif, Elsa D. Angelini, Isa...
ESORICS
2008
Springer
15 years 6 months ago
Location Privacy in Location-Based Services: Beyond TTP-based Schemes
Location-Based Services (LBS) are gaining importance due to the advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBS can jeopardise th...
Agusti Solanas, Josep Domingo-Ferrer, Antoni Mart&...
« Prev « First page 1344 / 1627 Last » Next »