Sciweavers

2102 search results - page 284 / 421
» A Relational Model for Object-Oriented Designs
Sort
View
87
Voted
APLAS
2004
ACM
15 years 7 months ago
An Algebraic Approach to Bi-directional Updating
In many occasions would one encounter the task of maintaining the consistency of two pieces of structured data that are related by some transform — synchronising bookmarks in di...
Shin-Cheng Mu, Zhenjiang Hu, Masato Takeichi
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 7 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 7 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
SWAT
2004
Springer
129views Algorithms» more  SWAT 2004»
15 years 7 months ago
Online Scheduling of Splittable Tasks in Peer-to-Peer Networks
We consider online scheduling of splittable tasks on parallel machines. In our model, each task can be split into a limited number of parts, that can then be scheduled independentl...
Leah Epstein, Rob van Stee
IAT
2003
IEEE
15 years 6 months ago
Web Course Self-Adaptation
This paper describes the methodology of an intelligent agent for building a self-adaptive course on the Web. An important task, therefore, is to combine adaptability with the lear...
Mohammed Abdel Razek, Claude Frasson, Marc Kaltenb...