Sciweavers

8825 search results - page 270 / 1765
» All for one or one for all
Sort
View
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
15 years 6 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
126
Voted
WDAG
1994
Springer
123views Algorithms» more  WDAG 1994»
15 years 5 months ago
Breakpoints and Time in Distributed Computations
This paper investigates how vector time can be used to set breakpoints in distributed computations for the purpose of analyzing and debugging distributed programs. A breakpoint is ...
Twan Basten
CLEF
2006
Springer
15 years 5 months ago
A High Precision Information Retrieval Method for WiQA
This paper presents Wolverhampton University's participation in the WiQA competition. The method chosen for this task combines a high precision, but low recall information re...
Constantin Orasan, Georgiana Puscasu
FQAS
2004
Springer
146views Database» more  FQAS 2004»
15 years 5 months ago
Discovering Representative Models in Large Time Series Databases
The discovery of frequently occurring patterns in a time series could be important in several application contexts. As an example, the analysis of frequent patterns in biomedical ...
Simona E. Rombo, Giorgio Terracina
COMPSAC
2001
IEEE
15 years 5 months ago
Scenario-Based Functional Regression Testing
Regression testing has been a popular quality assurance technique. Most regression testing techniques are based on code or software design. This paper proposes a scenario-based fu...
Raymond A. Paul, Lian Yu, Wei-Tek Tsai, Xiaoying B...