Sciweavers

AC
1998
Springer
13 years 4 months ago
Coordination Models and Languages
A new class of models, formalisms and mechanisms has recently evolved for describing concurrent and distributed computations based on the concept of “coordination”. The purpos...
George A. Papadopoulos, Farhad Arbab
AC
1998
Springer
13 years 4 months ago
Cellular Automata Models of Self-Replicating Systems
Abstract: Since von Neumann's seminal work around 1950, computer scientists and others have studied the algorithms needed to support self-replicating systems. Much of this wor...
James A. Reggia, Hui-Hsien Chou, Jason D. Lohn
AC
1998
Springer
13 years 4 months ago
Natural Language Processing: A Human-Computer Interaction Perspective
Natural language processing has been in existence for more than fifty years. During this time, it has significantly contributed to the field of human-computer interaction in terms...
Bill Z. Manaris
AC
1998
Springer
13 years 4 months ago
Role-Based Access Control
Ravi S. Sandhu
AC
1998
Springer
13 years 4 months ago
The State of Cryptographic Hash Functions
This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A...
Bart Preneel
AC
1998
Springer
13 years 8 months ago
Contemporary Block Ciphers
This paper considers modern secret-key block ciphers. The theory behind the design and analysis of modern block ciphers is explained, and the most important known attacks are outli...
Lars R. Knudsen
AC
1998
Springer
13 years 8 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
AC
1998
Springer
13 years 8 months ago
Emerging Standards for Public-Key Cryptography
Burton S. Kaliski Jr.