Sciweavers

INFORMATIKTAGE
2008
14 years 13 days ago
Practical Secure Function Evaluation
: This thesis focuses on the practical aspects of general two-party Secure Function Evaluation (SFE). A new SFE protocol that allows free evaluation of XOR gates and is provably se...
Thomas Schneider 0003
INFORMATIKTAGE
2008
14 years 13 days ago
An Energy-Efficient Routing Protocol for Linear Wireless Sensor Networks
: Economical power use is essential to allow for long-lasting operation of wireless sensor networks. This applies equally to linear sensor networks as they emerge when sensors are ...
Marco Zimmerling
INFORMATIKTAGE
2008
14 years 13 days ago
Context-Dependent and Self-Responsible Migration of Software Agents in Heterogeneous Environments
: Software agents are often employed in distributed environments to cope with the various dynamical dimensions of such systems. Furthermore, the paradigm of agent-oriented software...
Dirk Bade
INFORMATIKTAGE
2008
14 years 13 days ago
Constraint Based Transformation Theory
During the last 25 years the complexity and functionality of software systems has increased dramatically. Software systems have to be updated and restructured continuously [22]. I...
Stefan Natelberg