Sciweavers

103 search results - page 19 / 21
» Algebraic Methods for Interactive Proof Systems
Sort
View
71
Voted
ICALT
2008
IEEE
15 years 4 months ago
Encouraging Persons with Hearing Problem to Learn Sign Language by Internet Websites
Nowadays the Internet users are from different ages and groups. Disabled people are a group of the Internet users. Some websites are especially created for these people. One group...
Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza
84
Voted
WADT
1999
Springer
15 years 1 months ago
From States to Histories
Based on the FOCUS theory of distributed systems (see [Broy, Stølen 01]) that are composed of interacting components we introduce a formal model of services and layered architectu...
Manfred Broy
SPAA
2004
ACM
15 years 2 months ago
Lower bounds for graph embeddings and combinatorial preconditioners
Given a general graph G, a fundamental problem is to find a spanning tree H that best approximates G by some measure. Often this measure is some combination of the congestion and...
Gary L. Miller, Peter C. Richter
JALC
2006
125views more  JALC 2006»
14 years 9 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
91
Voted
ESORICS
2006
Springer
15 years 1 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright