Sciweavers

2061 search results - page 139 / 413
» Authorization for Metacomputing Applications
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
15 years 4 months ago
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem by employing Extended Euclidean algorithm. They claimed that the proposed scheme was untraceable...
Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang
ENTCS
2007
104views more  ENTCS 2007»
15 years 4 months ago
General Reversibility
The first and the second author introduced reversible ccs (rccs) in order to model concurrent computations where certain actions are allowed to be reversed. Here we t the core of...
Vincent Danos, Jean Krivine, Pawel Sobocinski
CACM
2004
88views more  CACM 2004»
15 years 4 months ago
Natural development of ubiquitous interfaces
ent through the use of meaningful abstractions in order to avoid dealing with low-level details. Despite this potential benefit, their adoption has mainly been limited to professio...
Silvia Berti, Fabio Paternò, Carmen Santoro
SAC
2008
ACM
15 years 2 months ago
Profile based comparative analysis for AOSE methodologies evaluation
This study focuses on the analysis and evaluation of agentoriented methodologies. Different studies have been proposed for the evaluation of agent-oriented methodologies adopting ...
Luca Cernuzzi, Franco Zambonelli
WWW
2009
ACM
16 years 5 months ago
A geographical analysis of knowledge production in computer science
We analyze knowledge production in Computer Science by means of coauthorship networks. For this, we consider 30 graduate programs of different regions of the world, being 8 progra...
Alberto H. F. Laender, Guilherme Vale Menezes, Niv...