Sciweavers

49 search results - page 7 / 10
» ucs 2007
Sort
View
ICALP
2007
Springer
13 years 9 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
FOCS
2007
IEEE
14 years 1 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
BIS
2006
105views Business» more  BIS 2006»
13 years 8 months ago
Describing Business Processes with Use Cases
Business processes can be described with diagrams, e.g. BPMN diagrams, or as text. Use cases are a text-based notation. They are semiformal: a business process is expressed as a s...
Jerzy R. Nawrocki, Tomasz Nedza, Miroslaw Ochodek,...
CEC
2007
IEEE
14 years 1 months ago
Directed intervention crossover applied to bio-control scheduling
—This paper describes two directed intervention crossover approaches that are applied to a bio-control dynamic system. Unlike traditional uniform crossover, both the Calculated E...
Paul M. Godley, David E. Cairns, Julie Cowie
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
A Wireless Sensor Network and Incident Command Interface for Urban Firefighting
­The Fire Information and Rescue Equipment project  at  UC  Berkeley  has  developed  a  prototype  wireless  sensor  network (WSN) and Incident Command (IC)...
Joel Wilson, Vikas Bhargava, Andrew Redfern, Paul ...