Sciweavers

371 search results - page 3 / 75
» Adaptation hiding modularity
Sort
View
EUROCRYPT
2012
Springer
13 years 1 days ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
ICSE
2008
IEEE-ACM
15 years 10 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
JNCA
2010
106views more  JNCA 2010»
14 years 8 months ago
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
Today’s web applications are more collaborative and are using the standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware...
Praveen Madiraju, Srilaxmi Malladi, Janaka Balasoo...
IAT
2009
IEEE
15 years 4 months ago
Modularity in BDI-Based Multi-agent Programming Languages
—This paper proposes a module-based vision for designing BDI-based multi-agent programming languages. The introduced concept of modules enables common programming techniques such...
Mehdi Dastani, Bas R. Steunebrink