Sciweavers

20175 search results - page 1 / 4035
» Is abstraction the key to computing
Sort
View
CACM
2007
164views more  CACM 2007»
13 years 5 months ago
Is abstraction the key to computing?
ACTION THE KEY TO COMPUTING? Why is it that some software engineers and computer scientists are able to produce clear, elegant designs and programs, while others cannot? Is it poss...
Jeff Kramer
IJMI
2007
86views more  IJMI 2007»
13 years 5 months ago
Using argumentation to extract key sentences from biomedical abstracts
s from Biomedical Abstracts Patrick Rucha , Celia Boyer c , Christine Chichesterb , Imad Tbahritiab Antoine Geissbühlera , Paul Fabrya , Julien Gobeilla , Violaine Pilletab , Diet...
Patrick Ruch, Célia Boyer, Christine Chiche...
CACM
2011
84views more  CACM 2011»
13 years 8 days ago
Using simple abstraction to reinvent computing for parallelism
ple abstraction encapsulating the desired interface between programmers and system builders. Using Simple ion to Reinvent Computing for Parallelism doi:10.1145/1866739.1866757 abst...
Uzi Vishkin
JOC
2007
125views more  JOC 2007»
13 years 5 months ago
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
Abstract. We address one of the most fundamental problems concerning the RSA cryptosystem: does the knowledge of the RSA public and secret key-pair (e, d) yield the factorization o...
Jean-Sébastien Coron, Alexander May
ASIACRYPT
2001
Springer
13 years 9 months ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan