Sciweavers

793 search results - page 73 / 159
» Argumentation and standards of proof
Sort
View
89
Voted
SMA
2005
ACM
125views Solid Modeling» more  SMA 2005»
15 years 6 months ago
One-dimensional selections for feature-based data exchange
In the parametric feature based design paradigm, most features possess arguments that are subsets of the boundary of the current model, subsets defined interactively by user sele...
Ari Rappoport, Steven N. Spitz, Michal Etzion
88
Voted
TOG
2002
116views more  TOG 2002»
15 years 11 days ago
Linear combination of transformations
Geometric transformations are most commonly represented as square matrices in computer graphics. Following simple geometric arguments we derive a natural and geometrically meaning...
Marc Alexa
82
Voted
ESORICS
2005
Springer
15 years 6 months ago
Security Notions for Disk Encryption
We define security goals and attack models for disk encryption, and prove several relationships between the resulting security notions, and some general results about disk encryp...
Kristian Gjøsteen
119
Voted
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
15 years 4 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
101
Voted
AAAI
1990
15 years 1 months ago
Inductive Synthesis of Equational Programs
An equational approach to the synthesis of functional and logic programs is taken. Typically, a target program contains equations that are only true in the standard model of the g...
Nachum Dershowitz, Eli Pinchover